Unnamed: 0
stringlengths 13
16
| mod_date
stringdate 2008-01-10 05:00:00
2019-11-21 15:15:00
| pub_date
stringdate 1999-01-01 05:00:00
2019-11-21 15:15:00
| cvss
float64 0
10
| cwe_code
int64 1
1.19k
| cwe_name
stringclasses 170
values | summary
stringlengths 23
3.93k
| access_authentication
stringclasses 3
values | access_complexity
stringclasses 3
values | access_vector
stringclasses 3
values | impact_availability
stringclasses 3
values | impact_confidentiality
stringclasses 3
values | impact_integrity
stringclasses 3
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2010-2064
|
2019-11-05 20:33:00
|
2019-10-29 22:15:00
| 3.6
| 59
|
Improper Link Resolution Before File Access ('Link Following')
|
rpcbind 0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr.
|
NONE
|
LOW
|
LOCAL
|
NONE
|
PARTIAL
|
PARTIAL
|
CVE-2019-18230
|
2019-11-05 20:29:00
|
2019-10-31 22:15:00
| 5
| 306
|
Missing Authentication for Critical Function
|
Honeywell equIP and Performance series IP cameras, multiple versions, A vulnerability exists where the affected product allows unauthenticated access to audio streaming over HTTP.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-0350
|
2019-11-05 20:27:00
|
2019-11-04 15:15:00
| 5
| 20
|
Improper Input Validation
|
SAP HANA Database, versions 1.0, 2.0, allows an unauthorized attacker to send a malformed connection request, which crashes the indexserver of an SAP HANA instance, leading to Denial of Service
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-18680
|
2019-11-05 20:21:00
|
2019-11-04 15:15:00
| 7.8
| 476
|
NULL Pointer Dereference
|
An issue was discovered in the Linux kernel 4.4.x before 4.4.195. There is a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service, aka CID-91573ae4aed0.
|
NONE
|
LOW
|
NETWORK
|
COMPLETE
|
NONE
|
NONE
|
CVE-2013-3718
|
2019-11-05 20:17:00
|
2019-11-01 13:15:00
| 4.3
| 20
|
Improper Input Validation
|
evince is missing a check on number of pages which can lead to a segmentation fault
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-18362
|
2019-11-05 20:07:00
|
2019-10-31 15:15:00
| 5
| 200
|
Information Exposure
|
JetBrains MPS before 2019.2.2 exposed listening ports to the network.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2010-3666
|
2019-11-05 20:01:00
|
2019-11-04 22:15:00
| 5
| 330
|
Use of Insufficiently Random Values
|
TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 contains insecure randomness in the uniqid function.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-18361
|
2019-11-05 19:53:00
|
2019-10-31 15:15:00
| 4.6
| 269
|
Improper Privilege Management
|
JetBrains IntelliJ IDEA before 2019.2 allows local user privilege escalation, potentially leading to arbitrary code execution.
|
NONE
|
LOW
|
LOCAL
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-18360
|
2019-11-05 19:48:00
|
2019-10-31 15:15:00
| 5
| 200
|
Information Exposure
|
In JetBrains Hub versions earlier than 2019.1.11738, username enumeration was possible through password recovery.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2013-4107
|
2019-11-05 19:38:00
|
2019-11-05 13:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Cryptocat before 2.0.22: cryptocat.js handlePresence() has cross site scripting
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-18624
|
2019-11-05 19:33:00
|
2019-10-29 19:15:00
| 7.5
| 20
|
Improper Input Validation
|
Opera Mini for Android allows attackers to bypass intended restrictions on .apk file download/installation via an RTLO (aka Right to Left Override) approach, as demonstrated by misinterpretation of malicious%E2%80%AEtxt.apk as maliciouskpa.txt. This affects 44.1.2254.142553, 44.1.2254.142659, and 44.1.2254.143214.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2010-3665
|
2019-11-05 19:30:00
|
2019-11-04 22:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows XSS on the Extension Manager.
|
SINGLE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-5533
|
2019-11-05 19:27:00
|
2019-10-29 19:15:00
| 4
| 200
|
Information Exposure
|
In VMware SD-WAN by VeloCloud versions 3.x prior to 3.3.0, the VeloCloud Orchestrator parameter authorization check mistakenly allows enterprise users to obtain information of Managed Service Provider accounts. Among the information is username, first and last name, phone numbers and e-mail address if present but no other personal data. VMware has evaluated the severity of this issue to be in the moderate severity range with a maximum CVSSv3 base score of 4.3.
|
SINGLE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-17675
|
2019-11-05 19:15:00
|
2019-10-17 13:15:00
| 6.8
| 843
|
Access of Resource Using Incompatible Type ('Type Confusion')
|
WordPress before 5.2.4 does not properly consider type confusion during validation of the referer in the admin pages, possibly leading to CSRF.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-17671
|
2019-11-05 19:15:00
|
2019-10-17 13:15:00
| 5
| 200
|
Information Exposure
|
In WordPress before 5.2.4, unauthenticated viewing of certain content is possible because the static query property is mishandled.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-17670
|
2019-11-05 19:15:00
|
2019-10-17 13:15:00
| 7.5
| 918
|
Server-Side Request Forgery (SSRF)
|
WordPress before 5.2.4 has a Server Side Request Forgery (SSRF) vulnerability because Windows paths are mishandled during certain validation of relative URLs.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-17669
|
2019-11-05 19:15:00
|
2019-10-17 13:15:00
| 7.5
| 918
|
Server-Side Request Forgery (SSRF)
|
WordPress before 5.2.4 has a Server Side Request Forgery (SSRF) vulnerability because URL validation does not consider the interpretation of a name as a series of hex characters.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-2389
|
2019-11-05 19:07:00
|
2019-08-30 15:15:00
| 1.9
| 20
|
Improper Input Validation
|
Incorrect scoping of kill operations in MongoDB Server's packaged SysV init scripts allow users with write access to the PID file to insert arbitrary PIDs to be killed when the root user stops the MongoDB process via SysV init. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.11; v3.6 versions prior to 3.6.14; v3.4 versions prior to 3.4.22.
|
NONE
|
MEDIUM
|
LOCAL
|
PARTIAL
|
NONE
|
NONE
|
CVE-2013-4110
|
2019-11-05 18:43:00
|
2019-11-05 13:15:00
| 5
| 200
|
Information Exposure
|
Cryptocat has an Unspecified Chat Participant User List Disclosure
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-0724
|
2019-11-05 18:40:00
|
2019-03-05 23:29:00
| 9.3
| 264
|
Permissions Privileges and Access Controls
|
An elevation of privilege vulnerability exists in Microsoft Exchange Server, aka 'Microsoft Exchange Server Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0686.
|
NONE
|
MEDIUM
|
NETWORK
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-6845
|
2019-11-05 18:38:00
|
2019-10-29 19:15:00
| 5
| 319
|
Cleartext Transmission of Sensitive Information
|
A CWE-319: Cleartext Transmission of Sensitive Information vulnerability exists in Modicon M580, Modicon M340, Modicon Premium , Modicon Quantum (all firmware versions), which could cause the disclosure of information when transferring applications to the controller using Modbus TCP protocol.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2010-3668
|
2019-11-05 18:38:00
|
2019-11-04 23:15:00
| 5
| 74
|
Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows Header Injection in the secure download feature jumpurl.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2010-3669
|
2019-11-05 18:25:00
|
2019-11-04 23:15:00
| 4.9
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
TYPO3 before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows XSS and Open Redirection in the frontend login box.
|
SINGLE
|
MEDIUM
|
NETWORK
|
NONE
|
PARTIAL
|
PARTIAL
|
CVE-2018-18929
|
2019-11-05 18:13:00
|
2019-10-29 20:15:00
| 4
| 798
|
Use of Hard-coded Credentials
|
The Tightrope Media Carousel Seneca HDn Windows-based appliance 7.0.4.104 is shipped with a default local administrator username and password. This can be found by a limited user account in an "unattend.xml" file left over on the C: drive from the Sysprep process. An attacker with this username and password can leverage it to gain administrator-level access on the system.
|
SINGLE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-18663
|
2019-11-05 18:12:00
|
2019-11-04 20:15:00
| 7.5
| 89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
A SQL injection vulnerability in a /login/forgot1 POST request in ARP-GUARD 4.0.0-5 allows unauthenticated remote attackers to execute arbitrary SQL commands via the user_id parameter.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2018-16659
|
2019-11-05 18:09:00
|
2018-09-28 00:29:00
| 7.5
| 89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
An issue was discovered in Rausoft ID.prove 2.95. The login page allows SQL injection via Microsoft SQL Server stacked queries in the Username POST parameter. Hypothetically, an attacker can utilize master..xp_cmdshell for the further privilege elevation.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2018-15560
|
2019-11-05 18:07:00
|
2018-08-20 00:29:00
| 5
| 190
|
Integer Overflow or Wraparound
|
PyCryptodome before 3.6.6 has an integer overflow in the data_len variable in AESNI.c, related to the AESNI_encrypt and AESNI_decrypt functions, leading to the mishandling of messages shorter than 16 bytes.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2018-18930
|
2019-11-05 18:01:00
|
2019-10-29 20:15:00
| 6.5
| 434
|
Unrestricted Upload of File with Dangerous Type
|
The Tightrope Media Carousel digital signage product 7.0.4.104 contains an arbitrary file upload vulnerability in the Manage Bulletins/Upload feature, which can be leveraged to gain remote code execution. An authenticated attacker can upload a crafted ZIP file (based on an exported backup of existing "Bulletins") containing a malicious file. When uploaded, the system only checks for the presence of the needed files within the ZIP and, as long as the malicious file is named properly, will extract all contained files to a new directory on the system, named with a random GUID. The attacker can determine this GUID by previewing an image from the uploaded Bulletin within the web UI. Once the GUID is determined, the attacker can navigate to the malicious file and execute it. In testing, an ASPX web shell was uploaded, allowing for remote-code execution in the context of a restricted IIS user.
|
SINGLE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2018-18931
|
2019-11-05 17:52:00
|
2019-10-29 20:15:00
| 9
| 269
|
Improper Privilege Management
|
An issue was discovered in the Tightrope Media Carousel digital signage product 7.0.4.104. Due to insecure default permissions on the C:\TRMS\Services directory, an attacker who has gained access to the system can elevate their privileges from a restricted account to full SYSTEM by replacing the Carousel.Service.exe file with a custom malicious executable. This service is independent of the associated IIS web site, which means that this service can be manipulated by an attacker without losing access to vulnerabilities in the web interface (which would potentially be used in conjunction with this attack, to control the service). Once the attacker has replaced Carousel.Service.exe, the server can be restarted using the command "shutdown -r -t 0" from a web shell, causing the system to reboot and launching the malicious Carousel.Service.exe as SYSTEM on startup. If this malicious Carousel.Service.exe is configured to launch a reverse shell back to the attacker, then upon reboot the attacker will have a fully privileged remote command-line environment to manipulate the system further.
|
SINGLE
|
LOW
|
NETWORK
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2010-3663
|
2019-11-05 17:51:00
|
2019-11-04 22:15:00
| 6.5
| 434
|
Unrestricted Upload of File with Dangerous Type
|
TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 contains an insecure default value of the variable fileDenyPattern which could allow remote attackers to execute arbitrary code on the backend.
|
SINGLE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-18604
|
2019-11-05 17:48:00
|
2019-10-29 19:15:00
| 7.5
| 20
|
Improper Input Validation
|
In axohelp.c before 1.3 in axohelp in axodraw2 before 2.1.1b, as distributed in TeXLive and other collections, sprintf is mishandled.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2010-3662
|
2019-11-05 17:48:00
|
2019-11-04 22:15:00
| 6.5
| 89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows SQL Injection on the backend.
|
SINGLE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2010-3664
|
2019-11-05 17:33:00
|
2019-11-04 22:15:00
| 4
| 200
|
Information Exposure
|
TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows Information Disclosure on the backend.
|
SINGLE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2010-3667
|
2019-11-05 17:10:00
|
2019-11-04 22:15:00
| 5
| 20
|
Improper Input Validation
|
TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows Spam Abuse in the native form content element.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-10249
|
2019-11-05 17:07:00
|
2019-05-06 16:29:00
| 6.8
| 254
|
7PK - Security Features
|
All Xtext & Xtend versions prior to 2.18.0 were built using HTTP instead of HTTPS file transfer and thus the built artifacts may have been compromised.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-15809
|
2019-11-05 17:03:00
|
2019-10-03 14:15:00
| 1.2
| 362
|
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
|
Smart cards from the Athena SCS manufacturer, based on the Atmel Toolbox 00.03.11.05 and the AT90SC chip, contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because the Atmel Toolbox 00.03.11.05 contains two versions of ECDSA signature functions, described as fast and secure, but the affected cards chose to use the fast version, which leaks the bit length of the random nonce via timing. This affects Athena IDProtect 010b.0352.0005, Athena IDProtect 010e.1245.0002, Athena IDProtect 0106.0130.0401, Athena IDProtect 010e.1245.0002, Valid S/A IDflex V 010b.0352.0005, SafeNet eToken 4300 010e.1245.0002, TecSec Armored Card 010e.0264.0001, and TecSec Armored Card 108.0264.0001.
|
NONE
|
HIGH
|
LOCAL
|
NONE
|
PARTIAL
|
NONE
|
CVE-2018-5744
|
2019-11-05 16:58:00
|
2019-10-09 16:15:00
| 5
| 772
|
Missing Release of Resource after Effective Lifetime
|
A failure to free memory can occur when processing messages having a specific combination of EDNS options. Versions affected are: BIND 9.10.7 -> 9.10.8-P1, 9.11.3 -> 9.11.5-P1, 9.12.0 -> 9.12.3-P1, and versions 9.10.7-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-10743
|
2019-11-05 16:54:00
|
2019-10-29 19:15:00
| 5.8
| 22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
All versions of archiver allow attacker to perform a Zip Slip attack via the "unarchive" functions. It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final path ending up outside of the target folder. For instance, a zip may hold a file with a "../../file.exe" location and thus break out of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
NONE
|
PARTIAL
|
CVE-2019-15681
|
2019-11-05 16:51:00
|
2019-10-29 19:15:00
| 5
| 772
|
Missing Release of Resource after Effective Lifetime
|
LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-16647
|
2019-11-05 16:49:00
|
2019-10-29 19:15:00
| 9
| 428
|
Unquoted Search Path or Element
|
Unquoted Search Path in Maxthon 5.1.0 to 5.2.7 Browser for Windows.
|
SINGLE
|
LOW
|
NETWORK
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-15683
|
2019-11-05 16:46:00
|
2019-10-29 19:15:00
| 7.5
| 787
|
Out-of-bounds Write
|
TurboVNC server code contains stack buffer overflow vulnerability in commit prior to cea98166008301e614e0d36776bf9435a536136e. This could possibly result into remote code execution, since stack frame is not protected with stack canary. This attack appear to be exploitable via network connectivity. To exploit this vulnerability authorization on server is required. These issues have been fixed in commit cea98166008301e614e0d36776bf9435a536136e.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-18632
|
2019-11-05 16:33:00
|
2019-10-30 22:15:00
| 7.5
| 295
|
Improper Certificate Validation
|
European Commission eIDAS-Node Integration Package before 2.3.1 allows Certificate Faking because an attacker can sign a manipulated SAML response with a forged certificate.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2013-1391
|
2019-11-05 16:33:00
|
2019-10-30 21:15:00
| 5
| 287
|
Improper Authentication
|
Authentication bypass vulnerability in the the web interface in Hunt CCTV, Capture CCTV, Hachi CCTV, NoVus CCTV, and Well-Vision Inc DVR systems allows a remote attacker to retrieve the device configuration.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-18633
|
2019-11-05 16:31:00
|
2019-10-30 22:15:00
| 7.5
| 295
|
Improper Certificate Validation
|
European Commission eIDAS-Node Integration Package before 2.3.1 has Missing Certificate Validation because a certain ExplicitKeyTrustEvaluator return value is not checked. NOTE: only 2.1 is confirmed to be affected.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2012-6122
|
2019-11-05 16:30:00
|
2019-10-31 21:15:00
| 5
| 120
|
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
|
Buffer overflow in the thread scheduler in Chicken before 4.8.0.1 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2010-0398
|
2019-11-05 16:22:00
|
2019-10-30 22:15:00
| 5.5
| 59
|
Improper Link Resolution Before File Access ('Link Following')
|
The init script in autokey before 0.61.3-2 allows local attackers to write to arbitrary files via a symlink attack.
|
SINGLE
|
LOW
|
NETWORK
|
PARTIAL
|
NONE
|
PARTIAL
|
CVE-2019-18277
|
2019-11-05 16:15:00
|
2019-10-23 14:15:00
| 4.3
| 20
|
Improper Input Validation
|
A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2010-0737
|
2019-11-05 16:04:00
|
2019-10-30 23:15:00
| 5.2
| 732
|
Incorrect Permission Assignment for Critical Resource
|
A missing permission check was found in The CLI in JBoss Operations Network before 2.3.1 does not properly check permissions, which allows JBoss ON users to perform management tasks and configuration changes with the privileges of the administrator user.
|
SINGLE
|
LOW
|
ADJACENT_NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-17598
|
2019-11-05 15:27:00
|
2019-11-05 15:15:00
| 4.3
| 522
|
Insufficiently Protected Credentials
|
An issue was discovered in Lightbend Play Framework 2.5.x through 2.6.23. When configured to make requests using an authenticated HTTP proxy, play-ws may sometimes, typically under high load, when connecting to a target host using https, expose the proxy credentials to the target host.
| null | null | null | null | null | null |
CVE-2019-17212
|
2019-11-05 15:27:00
|
2019-11-05 15:15:00
| 10
| 787
|
Out-of-bounds Write
|
Buffer overflows were discovered in the CoAP library in Arm Mbed OS 5.14.0. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses CoAP input linearly using a while loop. Once an option is parsed in a loop, the current point (*packet_data_pptr) is increased correspondingly. The pointer is restricted by the size of the received buffer, as well as by the 0xFF delimiter byte. Inside each while loop, the check of the value of *packet_data_pptr is not strictly enforced. More specifically, inside a loop, *packet_data_pptr could be increased and then dereferenced without checking. Moreover, there are many other functions in the format of sn_coap_parser_****() that do not check whether the pointer is within the bounds of the allocated buffer. All of these lead to heap-based or stack-based buffer overflows, depending on how the CoAP packet buffer is allocated.
| null | null | null | null | null | null |
CVE-2013-6461
|
2019-11-05 15:27:00
|
2019-11-05 15:15:00
| 4.3
| 776
|
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
|
Nokogiri gem 1.5.x and 1.6.x has DoS while parsing XML entities by failing to apply limits
| null | null | null | null | null | null |
CVE-2013-6460
|
2019-11-05 15:27:00
|
2019-11-05 15:15:00
| 4.3
| 776
|
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
|
Nokogiri gem 1.5.x has Denial of Service via infinite loop when parsing XML documents
| null | null | null | null | null | null |
CVE-2019-18635
|
2019-11-05 15:24:00
|
2019-10-30 22:15:00
| 5
| 476
|
NULL Pointer Dereference
|
An issue was discovered in Mooltipass Moolticute through v0.42.1 and v0.42.x-testing through v0.42.5-testing. There is a NULL pointer dereference in MPDevice_win.cpp.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2012-6125
|
2019-11-05 15:17:00
|
2019-10-31 21:15:00
| 7.5
| 20
|
Improper Input Validation
|
Chicken before 4.8.0 is susceptible to algorithmic complexity attacks related to hash table collisions.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-12314
|
2019-11-05 15:15:00
|
2019-05-24 14:29:00
| 7.5
| 22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
Deltek Maconomy 2.2.5 is prone to local file inclusion via absolute path traversal in the WS.macx1.W_MCS/ PATH_INFO, as demonstrated by a cgi-bin/Maconomy/MaconomyWS.macx1.W_MCS/etc/passwd URI.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-11341
|
2019-11-05 15:02:00
|
2019-10-09 16:15:00
| 2.1
| 327
|
Use of a Broken or Risky Cryptographic Algorithm
|
On certain Samsung P(9.0) phones, an attacker with physical access can start a TCP Dump capture without the user's knowledge. This feature of the Service Mode application is available after entering the *#9900# check code, but is protected by an OTP password. However, this password is created locally and (due to mishandling of cryptography) can be obtained easily by reversing the password creation logic.
|
NONE
|
LOW
|
LOCAL
|
NONE
|
PARTIAL
|
NONE
|
CVE-2018-8839
|
2019-11-05 14:58:00
|
2018-04-30 15:29:00
| 4.6
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Delta PMSoft versions 2.10 and prior have multiple stack-based buffer overflow vulnerabilities where a .ppm file can introduce a value larger than is readable by PMSoft's fixed-length stack buffer. This can cause the buffer to be overwritten, which may allow arbitrary code execution or cause the application to crash. CVSS v3 base score: 7.1; CVSS vector string: AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H. Delta Electronics recommends affected users update to at least PMSoft v2.11, which was made available as of March 22, 2018, or the latest available version.
|
NONE
|
LOW
|
LOCAL
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-15703
|
2019-11-05 14:57:00
|
2019-10-24 14:15:00
| 2.6
| 331
|
Insufficient Entropy
|
An Insufficient Entropy in PRNG vulnerability in Fortinet FortiOS 6.2.1 and below for device not enable hardware TRNG token and models not support builtin TRNG seed allows attacker to theoretically recover the long term ECDSA secret in a TLS client with a RSA handshake and mutual ECDSA authentication via the help of flush+reload side channel attacks in FortiGate VM models only.
|
NONE
|
HIGH
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-18206
|
2019-11-05 14:52:00
|
2019-10-30 19:15:00
| 6.8
| 352
|
Cross-Site Request Forgery (CSRF)
|
A cross-site request forgery (CSRF) vulnerability in Zucchetti InfoBusiness before and including 4.4.1 allows arbitrary file upload.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2018-6336
|
2019-11-05 14:52:00
|
2018-12-31 19:29:00
| 6.8
| 254
|
7PK - Security Features
|
An issue was discovered in osquery. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute. This issue affects osquery prior to v3.2.7
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-17224
|
2019-11-05 14:43:00
|
2019-10-28 15:15:00
| 5
| 22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
The web interface of the Compal Broadband CH7465LG modem (version CH7465LG-NCIP-6.12.18.25-2p6-NOSH) is vulnerable to a /%2f/ path traversal attack, which can be exploited in order to test for the existence of a file pathname outside of the web root directory. If a file exists but is not part of the product, there is a 404 error. If a file does not exist, there is a 302 redirect to index.html.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-5536
|
2019-11-05 14:39:00
|
2019-10-28 16:15:00
| 3.5
| 20
|
Improper Input Validation
|
VMware ESXi (6.7 before ESXi670-201908101-SG and 6.5 before ESXi650-201910401-SG), Workstation (15.x before 15.5.0) and Fusion (11.x before 11.5.0) contain a denial-of-service vulnerability in the shader functionality. Successful exploitation of this issue may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. Exploitation of this issue require an attacker to have access to a virtual machine with 3D graphics enabled. It is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.
|
SINGLE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-17221
|
2019-11-05 14:35:00
|
2019-11-05 14:15:00
| 5
| 552
|
Files or Directories Accessible to External Parties
|
PhantomJS through 2.1.1 has an arbitrary file read vulnerability, as demonstrated by an XMLHttpRequest for a file:// URI. The vulnerability exists in the page.open() function of the webpage module, which loads a specified URL and calls a given callback. An attacker can supply a specially crafted HTML file, as user input, that allows reading arbitrary files on the filesystem. For example, if page.render() is the function callback, this generates a PDF or an image of the targeted file. NOTE: this product is no longer developed.
| null | null | null | null | null | null |
CVE-2016-1000002
|
2019-11-05 14:35:00
|
2019-11-05 14:15:00
| 2.1
| 200
|
Information Exposure
|
gdm3 3.14.2 and possibly later has an information leak before screen lock
| null | null | null | null | null | null |
CVE-2013-6364
|
2019-11-05 14:35:00
|
2019-11-05 14:15:00
| 6.8
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Horde Groupware Webmail Edition has CSRF and XSS when saving search as a virtual address book
| null | null | null | null | null | null |
CVE-2019-5537
|
2019-11-05 14:34:00
|
2019-10-28 16:15:00
| 4.3
| 295
|
Improper Certificate Validation
|
Sensitive information disclosure vulnerability resulting from a lack of certificate validation during the File-Based Backup and Restore operations of VMware vCenter Server Appliance (6.7 before 6.7u3a and 6.5 before 6.5u3d) may allow a malicious actor to intercept sensitive data in transit over FTPS and HTTPS. A malicious actor with man-in-the-middle positioning between vCenter Server Appliance and a backup target may be able to intercept sensitive data in transit during File-Based Backup and Restore operations.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2005-3056
|
2019-11-05 14:33:00
|
2019-11-01 13:15:00
| 7.5
| 74
|
Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
TWiki allows arbitrary shell command execution via the Include function
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-5538
|
2019-11-05 14:31:00
|
2019-10-28 16:15:00
| 4.3
| 295
|
Improper Certificate Validation
|
Sensitive information disclosure vulnerability resulting from a lack of certificate validation during the File-Based Backup and Restore operations of VMware vCenter Server Appliance (6.7 before 6.7u3a and 6.5 before 6.5u3d) may allow a malicious actor to intercept sensitive data in transit over SCP. A malicious actor with man-in-the-middle positioning between vCenter Server Appliance and a backup target may be able to intercept sensitive data in transit during File-Based Backup and Restore operations.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2013-2261
|
2019-11-05 14:21:00
|
2019-11-04 16:15:00
| 5
| 200
|
Information Exposure
|
Cryptocat before 2.0.22 Chrome Extension 'img/keygen.gif' has Information Disclosure
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2013-4102
|
2019-11-05 14:13:00
|
2019-11-04 15:15:00
| 6.4
| 330
|
Use of Insufficiently Random Values
|
Cryptocat before 2.0.22 strophe.js Math.random() Random Number Generator Weakness
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
PARTIAL
|
CVE-2013-2257
|
2019-11-05 13:44:00
|
2019-11-04 17:15:00
| 5
| 307
|
Improper Restriction of Excessive Authentication Attempts
|
Cryptocat before 2.0.42 has Group Chat ECC Private Key Generation Brute Force Weakness
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2013-2259
|
2019-11-05 13:30:00
|
2019-11-04 17:15:00
| 7.5
| 20
|
Improper Input Validation
|
Cryptocat before 2.0.22 has Arbitrary Code Execution on Firefox Conversation Overview
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2013-4105
|
2019-11-05 13:22:00
|
2019-11-04 17:15:00
| 5
| 200
|
Information Exposure
|
Cryptocat before 2.0.22 has Multiparty Encryption Scheme Information Disclosure
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2013-2262
|
2019-11-05 13:22:00
|
2019-11-04 16:15:00
| 5
| 200
|
Information Exposure
|
Cryptocat strophe.js before 2.0.22 has information disclosure
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2013-4100
|
2019-11-05 13:16:00
|
2019-11-04 15:15:00
| 5
| 20
|
Improper Input Validation
|
Cryptocat before 2.0.22 has Remote Denial of Service via username
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-3685
|
2019-11-05 13:06:00
|
2019-11-05 10:15:00
| 6.8
| 295
|
Improper Certificate Validation
|
Open Build Service before version 0.165.4 diddn't validate TLS certificates for HTTPS connections with the osc client binary
| null | null | null | null | null | null |
CVE-2019-10223
|
2019-11-05 13:06:00
|
2019-11-05 12:15:00
| 4
| 200
|
Information Exposure
|
A security issue was discovered in the kube-state-metrics versions v1.7.0 and v1.7.1. An experimental feature was added to the v1.7.0 release that enabled annotations to be exposed as metrics. By default, the kube-state-metrics metrics only expose metadata about Secrets. However, a combination of the default `kubectl` behavior and this new feature can cause the entire secret content to end up in metric labels thus inadvertently exposing the secret content in metrics. This feature has been reverted and released as the v1.7.2 release. If you are running the v1.7.0 or v1.7.1 release, please upgrade to the v1.7.2 release as soon as possible.
| null | null | null | null | null | null |
CVE-2013-4374
|
2019-11-05 13:06:00
|
2019-11-04 22:15:00
| 3.6
| 668
|
Exposure of Resource to Wrong Sphere
|
An insecurity temporary file vulnerability exists in RHQ Mongo DB Drift Server through 2013-09-25 when unpacking zipped files.
| null | null | null | null | null | null |
CVE-2019-6128
|
2019-11-05 10:15:00
|
2019-01-11 05:29:00
| 6.8
| 399
|
Resource Management Errors
|
The TIFFFdOpen function in tif_unix.c in LibTIFF 4.0.10 has a memory leak, as demonstrated by pal2rgb.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2017-5333
|
2019-11-04 21:19:00
|
2019-11-04 21:15:00
| 6.8
| 190
|
Integer Overflow or Wraparound
|
Integer overflow in the extract_group_icon_cursor_resource function in b/wrestool/extract.c in icoutils before 0.31.1 allows local users to cause a denial of service (process crash) or execute arbitrary code via a crafted executable file.
| null | null | null | null | null | null |
CVE-2013-4409
|
2019-11-04 21:19:00
|
2019-11-04 21:15:00
| 7.5
| 20
|
Improper Input Validation
|
An eval() vulnerability exists in Python Software Foundation Djblets 0.7.21 and Beanbag Review Board before 1.7.15 when parsing JSON requests.
| null | null | null | null | null | null |
CVE-2019-18667
|
2019-11-04 21:15:00
|
2019-11-02 16:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
/usr/local/www/freeradius_view_config.php in the freeradius3 package before 0.15.7_3 for pfSense on FreeBSD allows a user with an XSS payload as password or username to execute arbitrary javascript code on a victim browser.
| null | null | null | null | null | null |
CVE-2005-2350
|
2019-11-04 21:06:00
|
2019-11-01 18:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Cross-site scripting (XSS) vulnerability in websieve v0.62 allows remote attackers to inject arbitrary web script or HTML code in the web user interface.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2013-2738
|
2019-11-04 20:56:00
|
2019-11-01 12:15:00
| 7.5
| 89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
minidlna has SQL Injection that may allow retrieval of arbitrary files
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2013-2600
|
2019-11-04 20:56:00
|
2019-11-01 12:15:00
| 5
| 200
|
Information Exposure
|
MiniUPnPd has information disclosure use of snprintf()
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2013-2739
|
2019-11-04 20:53:00
|
2019-11-01 13:15:00
| 7.5
| 787
|
Out-of-bounds Write
|
MiniDLNA has heap-based buffer overflow
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-16907
|
2019-11-04 20:40:00
|
2019-10-31 22:15:00
| 5
| 287
|
Improper Authentication
|
An issue was discovered in the Infosysta "In-App & Desktop Notifications" app 1.6.13_J8 for Jira. It is possible to obtain a list of all valid Jira usernames without authentication/authorization via the plugins/servlet/nfj/UserFilter?searchQuery=@ URI.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-16908
|
2019-11-04 20:39:00
|
2019-11-01 12:15:00
| 5
| 200
|
Information Exposure
|
An issue was discovered in the Infosysta "In-App & Desktop Notifications" app before 1.6.14_J8 for Jira. It is possible to obtain a list of all Jira projects without authentication/authorization via the plugins/servlet/nfj/ProjectFilter?searchQuery= URI.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-18178
|
2019-11-04 20:35:00
|
2019-11-04 20:15:00
| 5
| 416
|
Use After Free
|
Real Time Engineers FreeRTOS+FAT 160919a has a use after free. The function FF_Close() is defined in ff_file.c. The file handler pxFile is freed by ffconfigFREE, which (by default) is a macro definition of vPortFree(), but it is reused to flush modified file content from the cache to disk by the function FF_FlushCache().
| null | null | null | null | null | null |
CVE-2019-17210
|
2019-11-04 20:35:00
|
2019-11-04 20:15:00
| 5
| 20
|
Improper Input Validation
|
A denial-of-service issue was discovered in the MQTT library in Arm Mbed OS 2017-11-02. The function readMQTTLenString() is called by the function MQTTDeserialize_publish() to get the length and content of the MQTT topic name. In the function readMQTTLenString(), mqttstring->lenstring.len is a part of user input, which can be manipulated. An attacker can simply change it to a larger value to invalidate the if statement so that the statements inside the if statement are skipped, letting the value of mqttstring->lenstring.data default to zero. Later, curn is accessed, which points to mqttstring->lenstring.data. On an Arm Cortex-M chip, the value at address 0x0 is actually the initialization value for the MSP register. It is highly dependent on the actual firmware. Therefore, the behavior of the program is unpredictable from this time on.
| null | null | null | null | null | null |
CVE-2013-4251
|
2019-11-04 20:35:00
|
2019-11-04 20:15:00
| 4.6
| 269
|
Improper Privilege Management
|
The scipy.weave component in SciPy before 0.12.1 creates insecure temporary directories.
| null | null | null | null | null | null |
CVE-2019-16909
|
2019-11-04 20:34:00
|
2019-11-01 12:15:00
| 4
| 200
|
Information Exposure
|
An issue was discovered in the Infosysta "In-App & Desktop Notifications" app before 1.6.14_J8 for Jira. It is possible to obtain a list of all Jira projects (with authentication as a Jira user, but without authorization for specific projects) via the plugins/servlet/nfj/NotificationSettings URI.
|
SINGLE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-16906
|
2019-11-04 20:21:00
|
2019-10-31 22:15:00
| 5
| 287
|
Improper Authentication
|
An issue was discovered in the Infosysta "In-App & Desktop Notifications" app 1.6.13_J8 for Jira. By using plugins/servlet/nfj/PushNotification?username= with a modified username, a different user's notifications can be read without authentication/authorization. These notifications are then no longer displayed to the normal user.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-5151
|
2019-11-04 20:14:00
|
2019-10-31 20:15:00
| 7.5
| 89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
An exploitable SQL injection vulnerability exist in YouPHPTube 7.7. A specially crafted unauthenticated HTTP request can cause a SQL injection, possibly leading to denial of service, exfiltration of the database and local file inclusion, which could potentially further lead to code execution. An attacker can send an HTTP request to trigger this vulnerability.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2013-4168
|
2019-11-04 20:04:00
|
2019-11-01 20:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Cross-site scripting (XSS) vulnerability in SmokePing 2.6.9 in the start and end time fields.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2013-2227
|
2019-11-04 20:00:00
|
2019-11-01 17:15:00
| 5
| 20
|
Improper Input Validation
|
GLPI 0.83.7 has Local File Inclusion in common.tabs.php.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2005-4890
|
2019-11-04 19:56:00
|
2019-11-04 19:15:00
| 7.2
| 20
|
Improper Input Validation
|
There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.
| null | null | null | null | null | null |
CVE-2013-4412
|
2019-11-04 19:53:00
|
2019-11-04 13:15:00
| 5
| 476
|
NULL Pointer Dereference
|
slim has NULL pointer dereference when using crypt() method from glibc 2.17
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2010-2548
|
2019-11-04 19:50:00
|
2019-10-31 21:15:00
| 6.4
| 863
|
Incorrect Authorization
|
IcedTea6 before 1.7.4 does not properly check property access, which allows unsigned apps to read and write arbitrary files.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
PARTIAL
|
CVE-2010-2783
|
2019-11-04 19:45:00
|
2019-10-31 21:15:00
| 6.4
| 200
|
Information Exposure
|
IcedTea6 before 1.7.4 allow unsigned apps to read and write arbitrary files, related to Extended JNLP Services.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
PARTIAL
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.