Unnamed: 0
stringlengths 13
16
| mod_date
stringdate 2008-01-10 05:00:00
2019-11-21 15:15:00
| pub_date
stringdate 1999-01-01 05:00:00
2019-11-21 15:15:00
| cvss
float64 0
10
| cwe_code
int64 1
1.19k
| cwe_name
stringclasses 170
values | summary
stringlengths 23
3.93k
| access_authentication
stringclasses 3
values | access_complexity
stringclasses 3
values | access_vector
stringclasses 3
values | impact_availability
stringclasses 3
values | impact_confidentiality
stringclasses 3
values | impact_integrity
stringclasses 3
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2019-12017
|
2019-10-29 17:59:00
|
2019-10-24 15:15:00
| 7.5
| 20
|
Improper Input Validation
|
A remote code execution vulnerability exists in MapR CLDB code, specifically in the JSON framework that is used in the CLDB code that handles login and ticket issuance. An attacker can use the 'class' property of the JSON request sent to the CLDB to influence the JSON library's decision on which Java class this JSON request is deserialized to. By doing so, the attacker can force the MapR CLDB to construct a URLClassLoader which loads a malicious Java class from a remote path and instantiate this object in the MapR CLDB, thus executing arbitrary code on the machine running the MapR CLDB and take over the cluster. By switching to the newer Jackson library and ensuring that all incoming JSON requests are only deserialized to the same class that it was serialized from, the vulnerability is fixed. This vulnerability affects the entire MapR core platform.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-5012
|
2019-10-29 17:47:00
|
2019-10-24 16:15:00
| 7.2
| 269
|
Improper Privilege Management
|
An exploitable privilege escalation vulnerability exists in the Wacom, driver version 6.3.32-3, update helper service in the startProcess command. The command takes a user-supplied script argument and executes it under root context. A user with local access can use this vulnerability to raise their privileges to root. An attacker would need local access to the machine for a successful exploit.
|
NONE
|
LOW
|
LOCAL
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-5013
|
2019-10-29 17:41:00
|
2019-10-24 16:15:00
| 7.2
| 269
|
Improper Privilege Management
|
An exploitable privilege escalation vulnerability exists in the Wacom, driver version 6.3.32-3, update helper service in the start/stopLaunchDProcess command. The command takes a user-supplied string argument and executes launchctl under root context. A user with local access can use this vulnerability to raise load arbitrary launchD agents. An attacker would need local access to the machine for a successful exploit.
|
NONE
|
LOW
|
LOCAL
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2016-5202
|
2019-10-29 16:24:00
|
2019-10-25 15:15:00
| 7.5
| 732
|
Incorrect Permission Assignment for Critical Resource
|
browser/extensions/api/dial/dial_registry.cc in Google Chrome before 54.0.2840.98 on macOS, before 54.0.2840.99 on Windows, and before 54.0.2840.100 on Linux neglects to copy a device ID before an erase() call, which causes the erase operation to access data that that erase operation will destroy.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2013-4855
|
2019-10-29 16:19:00
|
2019-10-25 16:15:00
| 7.9
| 22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
D-Link DIR-865L has SMB Symlink Traversal due to misconfiguration in the SMB service allowing symbolic links to be created to locations outside of the Samba share.
|
NONE
|
MEDIUM
|
ADJACENT_NETWORK
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2013-4658
|
2019-10-29 16:15:00
|
2019-10-25 17:15:00
| 10
| 22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
Linksys EA6500 has SMB Symlink Traversal allowing symbolic links to be created to locations outside of the Samba share.
|
NONE
|
LOW
|
NETWORK
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2013-4856
|
2019-10-29 16:00:00
|
2019-10-25 16:15:00
| 2.9
| 200
|
Information Exposure
|
D-Link DIR-865L has Information Disclosure.
|
NONE
|
MEDIUM
|
ADJACENT_NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2015-9517
|
2019-10-29 14:25:00
|
2019-10-23 17:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The Easy Digital Downloads (EDD) Manual Purchases extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2015-9516
|
2019-10-29 14:21:00
|
2019-10-23 17:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The Easy Digital Downloads (EDD) Invoices extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2015-9518
|
2019-10-29 14:18:00
|
2019-10-23 17:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The Easy Digital Downloads (EDD) PDF Invoices extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2015-9519
|
2019-10-29 14:11:00
|
2019-10-23 17:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The Easy Digital Downloads (EDD) PDF Stamper extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2015-9520
|
2019-10-29 13:53:00
|
2019-10-23 17:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The Easy Digital Downloads (EDD) Per Product Emails extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2015-9521
|
2019-10-29 13:52:00
|
2019-10-23 17:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The Easy Digital Downloads (EDD) Pushover Notifications extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2015-9522
|
2019-10-29 13:47:00
|
2019-10-23 17:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The Easy Digital Downloads (EDD) QR Code extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2015-9523
|
2019-10-29 13:44:00
|
2019-10-23 17:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The Easy Digital Downloads (EDD) Recommended Products extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2015-9524
|
2019-10-29 13:40:00
|
2019-10-23 17:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The Easy Digital Downloads (EDD) Recount Earnings extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2016-2358
|
2019-10-29 13:23:00
|
2019-10-25 15:15:00
| 5
| 798
|
Use of Hard-coded Credentials
|
Milesight IP security cameras through 2016-11-14 have a default set of 10 privileged accounts with hardcoded credentials. They are accessible if the customer has not configured 10 actual user accounts.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2016-2357
|
2019-10-29 13:20:00
|
2019-10-25 15:15:00
| 5
| 798
|
Use of Hard-coded Credentials
|
Milesight IP security cameras through 2016-11-14 have a hardcoded SSL private key under the /etc/config directory.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2016-2360
|
2019-10-29 13:19:00
|
2019-10-25 15:15:00
| 5
| 798
|
Use of Hard-coded Credentials
|
Milesight IP security cameras through 2016-11-14 have a default root password in /etc/shadow that is the same across different customers' installations.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2016-2359
|
2019-10-29 13:19:00
|
2019-10-25 15:15:00
| 7.5
| 287
|
Improper Authentication
|
Milesight IP security cameras through 2016-11-14 allow remote attackers to bypass authentication and access a protected resource by simultaneously making a request for the unprotected vb.htm resource.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2016-2356
|
2019-10-29 13:18:00
|
2019-10-25 15:15:00
| 7.5
| 120
|
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
|
Milesight IP security cameras through 2016-11-14 have a buffer overflow in a web application via a long username or password.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-18350
|
2019-10-29 13:16:00
|
2019-10-23 18:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
In Ant Design Pro 4.0.0, reflected XSS in the user/login redirect GET parameter affects the authorization component, leading to execution of JavaScript code in the login after-action script.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-17093
|
2019-10-29 13:12:00
|
2019-10-23 17:15:00
| 4.4
| 426
|
Untrusted Search Path
|
An issue was discovered in Avast antivirus before 19.8 and AVG antivirus before 19.8. A DLL Preloading vulnerability allows an attacker to implant %WINDIR%\system32\wbemcomn.dll, which is loaded into a protected-light process (PPL) and might bypass some of the self-defense mechanisms. This affects all components that use WMI, e.g., AVGSvc.exe 19.6.4546.0 and TuneupSmartScan.dll 19.1.884.0.
|
NONE
|
MEDIUM
|
LOCAL
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2015-9506
|
2019-10-29 13:11:00
|
2019-10-23 17:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The Easy Digital Downloads (EDD) Amazon S3 extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-18348
|
2019-10-29 12:47:00
|
2019-10-23 17:15:00
| 4.3
| 74
|
Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.)
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-12095
|
2019-10-29 12:40:00
|
2019-10-24 18:15:00
| 6.8
| 352
|
Cross-Site Request Forgery (CSRF)
|
Horde Trean, as used in Horde Groupware Webmail Edition through 5.2.22 and other products, allows CSRF, as demonstrated by the treanBookmarkTags parameter to the trean/ URI on a webmail server.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2017-14633
|
2019-10-29 00:55:00
|
2017-09-21 07:29:00
| 4.3
| 125
|
Out-of-bounds Read
|
In Xiph.Org libvorbis 1.3.5, an out-of-bounds array read vulnerability exists in the function mapping0_forward() in mapping0.c, which may lead to DoS when operating on a crafted audio file with vorbis_analysis().
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2017-14632
|
2019-10-29 00:55:00
|
2017-09-21 07:29:00
| 7.5
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Xiph.Org libvorbis 1.3.5 allows Remote Code Execution upon freeing uninitialized memory in the function vorbis_analysis_headerout() in info.c when vi->channels<=0, a similar issue to Mozilla bug 550184.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-18393
|
2019-10-28 19:04:00
|
2019-10-24 11:15:00
| 5
| 22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
PluginServlet.java in Ignite Realtime Openfire through 4.4.2 does not ensure that retrieved files are located under the Openfire home directory, aka a directory traversal vulnerability.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-4394
|
2019-10-28 19:00:00
|
2019-10-25 17:15:00
| 2.1
| 20
|
Improper Input Validation
|
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 contain APIs that could be used by a local user to send email. IBM X-Force ID: 162232.
|
NONE
|
LOW
|
LOCAL
|
NONE
|
NONE
|
PARTIAL
|
CVE-2013-4848
|
2019-10-28 18:58:00
|
2019-10-25 17:15:00
| 9.3
| 352
|
Cross-Site Request Forgery (CSRF)
|
TP-Link TL-WDR4300 version 3.13.31 has multiple CSRF vulnerabilities.
|
NONE
|
MEDIUM
|
NETWORK
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-4459
|
2019-10-28 18:19:00
|
2019-10-24 12:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise 2.5 through 2.5.0.9 and 2.4 through 2.4.0.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 163656.
|
SINGLE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-4398
|
2019-10-28 18:18:00
|
2019-10-24 12:15:00
| 2.1
| 311
|
Missing Encryption of Sensitive Data
|
IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise 2.5 through 2.5.0.9 and 2.4 through 2.4.0.5 could allow a local user to obtain sensitive information from SessionManagement cookies. IBM X-Force ID: 162259.
|
NONE
|
LOW
|
LOCAL
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-3982
|
2019-10-28 18:10:00
|
2019-10-23 19:15:00
| 4
| 20
|
Improper Input Validation
|
Nessus versions 8.6.0 and earlier were found to contain a Denial of Service vulnerability due to improper validation of specific imported scan types. An authenticated, remote attacker could potentially exploit this vulnerability to cause a Nessus scanner to become temporarily unresponsive.
|
SINGLE
|
LOW
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-4486
|
2019-10-28 18:09:00
|
2019-10-24 12:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
IBM Maximo Asset Management 7.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 164070.
|
SINGLE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-12094
|
2019-10-28 17:34:00
|
2019-10-24 17:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Horde Groupware Webmail Edition through 5.2.22 allows XSS via an admin/user.php?form=update_f&user_name= or admin/user.php?form=remove_f&user_name= or admin/config/diff.php?app= URI, related to the Tag Cloud feature.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-17141
|
2019-10-28 17:31:00
|
2019-10-25 19:15:00
| 6.8
| 416
|
Use After Free
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of script within a Calculate action of a text field. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9044.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-17139
|
2019-10-28 17:18:00
|
2019-10-25 19:15:00
| 6.8
| 787
|
Out-of-bounds Write
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Javascript in the HTML2PDF plugin. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-8692.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-17140
|
2019-10-28 17:17:00
|
2019-10-25 19:15:00
| 6.8
| 416
|
Use After Free
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the OnFocus event. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9091.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-17142
|
2019-10-28 17:16:00
|
2019-10-25 19:15:00
| 6.8
| 416
|
Use After Free
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of script within a Keystroke action of a listbox field. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9081.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-17144
|
2019-10-28 17:15:00
|
2019-10-25 19:15:00
| 6.8
| 787
|
Out-of-bounds Write
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of DWG files to PDF. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9274.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-17143
|
2019-10-28 17:15:00
|
2019-10-25 19:15:00
| 4.3
| 416
|
Use After Free
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWG files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-9273.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2016-4986
|
2019-10-28 17:09:00
|
2017-02-09 15:59:00
| 5
| 22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
Directory traversal vulnerability in the TAP plugin before 1.25 in Jenkins allows remote attackers to read arbitrary files via an unspecified parameter.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2016-3101
|
2019-10-28 17:09:00
|
2017-02-09 15:59:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Cross-site scripting (XSS) vulnerability in the Extra Columns plugin before 1.17 in Jenkins allows remote attackers to inject arbitrary web script or HTML by leveraging failure to filter tool tips through the configured markup formatter.
|
SINGLE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2016-4988
|
2019-10-28 17:08:00
|
2017-02-09 15:59:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Cross-site scripting (XSS) vulnerability in the Build Failure Analyzer plugin before 1.16.0 in Jenkins allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2016-4987
|
2019-10-28 17:08:00
|
2017-02-09 15:59:00
| 4
| 22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
Directory traversal vulnerability in the Image Gallery plugin before 1.4 in Jenkins allows remote attackers to list arbitrary directories and read arbitrary files via unspecified form fields.
|
SINGLE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-17581
|
2019-10-28 16:55:00
|
2019-10-24 14:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
tonyy dormsystem through 1.3 allows DOM XSS.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-18387
|
2019-10-28 16:52:00
|
2019-10-23 23:15:00
| 7.5
| 89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
Sourcecodester Hotel and Lodge Management System 1.0 is vulnerable to unauthenticated SQL injection and can allow remote attackers to execute arbitrary SQL commands via the id parameter to the edit page for Customer, Room, Currency, Room Booking Details, or Tax Details.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-18415
|
2019-10-28 16:42:00
|
2019-10-24 18:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Sourcecodester Restaurant Management System 1.0 allows XSS via the "send a message" screen.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-18414
|
2019-10-28 16:42:00
|
2019-10-24 18:15:00
| 6.8
| 352
|
Cross-Site Request Forgery (CSRF)
|
Sourcecodester Restaurant Management System 1.0 is affected by an admin/staff-exec.php Cross Site Request Forgery vulnerability due to a lack of CSRF protection. This could lead to an attacker tricking the administrator into executing arbitrary code or adding a staff entry via a crafted HTML page.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-18416
|
2019-10-28 16:40:00
|
2019-10-24 18:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Sourcecodester Restaurant Management System 1.0 allows XSS via the Last Name field of a member.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-18417
|
2019-10-28 16:39:00
|
2019-10-24 18:15:00
| 6.5
| 434
|
Unrestricted Upload of File with Dangerous Type
|
Sourcecodester Restaurant Management System 1.0 allows an authenticated attacker to upload arbitrary files that can result in code execution. The issue occurs because the application fails to adequately sanitize user-supplied input, e.g., "add a new food" allows .php files.
|
SINGLE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-17606
|
2019-10-28 16:36:00
|
2019-10-23 17:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The Post editor functionality in the hexo-admin plugin versions 2.3.0 and earlier for Node.js is vulnerable to stored XSS via the content of a post.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-17184
|
2019-10-28 16:15:00
|
2019-10-04 23:15:00
| 7.5
| 269
|
Improper Privilege Management
|
Xerox AtlaLink B8045/B8055/B8065/B8075/B8090 C8030/C8035/C8045/C8055/C8070 printers with software before 101.00x.089.22600 allow an attacker to gain privileges.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-16167
|
2019-10-28 16:15:00
|
2019-09-09 17:15:00
| 4.3
| 190
|
Integer Overflow or Wraparound
|
sysstat before 12.1.6 has memory corruption due to an Integer Overflow in remap_struct() in sa_common.c.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-17145
|
2019-10-28 15:46:00
|
2019-10-25 19:15:00
| 6.8
| 787
|
Out-of-bounds Write
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of DXF files to PDF. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9276.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-8237
|
2019-10-28 15:38:00
|
2019-10-23 21:15:00
| 10
| 326
|
Inadequate Encryption Strength
|
Adobe Acrobat and Reader versions 2019.012.20034 and earlier; 2019.012.20035 and earlier versions; 2017.011.30142 and earlier versions; 2017.011.30143 and earlier versions; 2015.006.30497 and earlier versions; 2015.006.30498 and earlier versions have an Insufficiently Robust Encryption vulnerability. Successful exploitation could lead to Security feature bypass in the context of the current user.
|
NONE
|
LOW
|
NETWORK
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-8238
|
2019-10-28 15:35:00
|
2019-10-23 21:15:00
| 5
| 22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
Adobe Acrobat and Reader versions 2019.010.20100 and earlier; 2019.010.20099 and earlier versions; 2017.011.30140 and earlier version; 2017.011.30138 and earlier version; 2015.006.30495 and earlier versions; 2015.006.30493 and earlier versions have a Path Traversal vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2017-16355
|
2019-10-28 15:31:00
|
2017-12-14 22:29:00
| 1.2
| 200
|
Information Exposure
|
In agent/Core/SpawningKit/Spawner.h in Phusion Passenger 5.1.10 (fixed in Passenger Open Source 5.1.11 and Passenger Enterprise 5.1.10), if Passenger is running as root, it is possible to list the contents of arbitrary files on a system by symlinking a file named REVISION from the application root folder to a file of choice and querying passenger-status --show=xml.
|
NONE
|
HIGH
|
LOCAL
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-13653
|
2019-10-28 15:29:00
|
2019-10-24 15:15:00
| 10
| 78
|
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
|
TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow triggerPort OS Command Injection (issue 5 of 5).
|
NONE
|
LOW
|
NETWORK
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-13652
|
2019-10-28 15:28:00
|
2019-10-24 15:15:00
| 10
| 78
|
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
|
TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow serviceName OS Command Injection (issue 4 of 5).
|
NONE
|
LOW
|
NETWORK
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-13651
|
2019-10-28 15:27:00
|
2019-10-24 15:15:00
| 10
| 78
|
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
|
TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow portMappingProtocol OS Command Injection (issue 3 of 5).
|
NONE
|
LOW
|
NETWORK
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-13650
|
2019-10-28 15:27:00
|
2019-10-24 15:15:00
| 10
| 78
|
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
|
TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow internalPort OS Command Injection (issue 2 of 5).
|
NONE
|
LOW
|
NETWORK
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-13649
|
2019-10-28 15:27:00
|
2019-10-24 15:15:00
| 10
| 78
|
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
|
TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow externalPort OS Command Injection (issue 1 of 5).
|
NONE
|
LOW
|
NETWORK
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-9597
|
2019-10-28 15:17:00
|
2019-10-23 19:15:00
| 4.3
| 352
|
Cross-Site Request Forgery (CSRF)
|
Darktrace Enterprise Immune System before 3.1 allows CSRF via the /config endpoint.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-9596
|
2019-10-28 15:17:00
|
2019-10-23 19:15:00
| 4.3
| 352
|
Cross-Site Request Forgery (CSRF)
|
Darktrace Enterprise Immune System before 3.1 allows CSRF via the /whitelisteddomains endpoint.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-10079
|
2019-10-28 15:15:00
|
2019-10-22 16:15:00
| 5
| 20
|
Improper Input Validation
|
Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier versions of Apache Traffic Server didn't limit the number of setting frames sent from the client using the HTTP/2 protocol. Users should upgrade to Apache Traffic Server 7.1.7, 8.0.4, or later versions.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2017-5731
|
2019-10-28 15:15:00
|
2019-10-28 15:15:00
| 4.6
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Bounds checking in Tianocompress before November 7, 2017 may allow an authenticated user to potentially enable an escalation of privilege via local access.
| null | null | null | null | null | null |
CVE-2019-18357
|
2019-10-28 15:12:00
|
2019-10-23 19:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
An XSS issue was discovered in Thycotic Secret Server before 10.7 (issue 2 of 2).
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-18356
|
2019-10-28 15:09:00
|
2019-10-23 19:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
An XSS issue was discovered in Thycotic Secret Server before 10.7 (issue 1 of 2).
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-17138
|
2019-10-28 15:08:00
|
2019-10-25 19:15:00
| 4.3
| 125
|
Out-of-bounds Read
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.909. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion from JPEG to EPS. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8809.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-4461
|
2019-10-28 14:19:00
|
2019-10-25 17:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 is vulnerable to HTTP Response Splitting caused by improper caching of content. This would allow the attacker to perform further attacks, such as Web Cache poisoning, cross-site scripting and possibly obtain sensitive information. IBM X-Force ID: 163682.
|
SINGLE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-16265
|
2019-10-28 14:17:00
|
2019-10-25 17:15:00
| 7.5
| 787
|
Out-of-bounds Write
|
CODESYS V2.3 ENI server up to V3.2.2.24 has a Buffer Overflow.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-4396
|
2019-10-28 14:05:00
|
2019-10-25 17:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 is vulnerable to HTTP response splitting attacks, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to inject arbitrary HTTP headers and cause the server to return a split response, once the URL is clicked. This would allow the attacker to perform further attacks, such as Web cache poisoning or cross-site scripting, and possibly obtain sensitive information. IBM X-Force ID: 162236.
|
SINGLE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-14451
|
2019-10-28 13:57:00
|
2019-10-25 17:15:00
| 10
| 434
|
Unrestricted Upload of File with Dangerous Type
|
RepetierServer.exe in Repetier-Server 0.8 through 0.91 does not properly validate the XML data structure provided when uploading a new printer configuration. When this is combined with CVE-2019-14450, an attacker can upload an "external command" configuration as a printer configuration, and achieve remote code execution. After exploitation, loading of the external command configuration is dependent on a system reboot or service restart.
|
NONE
|
LOW
|
NETWORK
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-4400
|
2019-10-28 13:51:00
|
2019-10-25 17:15:00
| 4
| 22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 162261.
|
SINGLE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-4399
|
2019-10-28 13:48:00
|
2019-10-25 17:15:00
| 5
| 327
|
Use of a Broken or Risky Cryptographic Algorithm
|
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 162260.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-11816
|
2019-10-28 13:47:00
|
2019-05-20 22:29:00
| 6.5
| 284
|
Improper Access Control
|
Incorrect access control in the WebUI in OPNsense before version 19.1.8, and pfsense before 2.4.4-p3 allows remote authenticated users to escalate privileges to administrator via a specially crafted request.
|
SINGLE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-4395
|
2019-10-28 13:46:00
|
2019-10-25 17:15:00
| 2.1
| 200
|
Information Exposure
|
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 could allow a local user to obtain sensitive information from temporary script files. IBM X-Force ID: 162333.
|
NONE
|
LOW
|
LOCAL
|
NONE
|
PARTIAL
|
NONE
|
CVE-2013-4857
|
2019-10-28 13:45:00
|
2019-10-25 16:15:00
| 7.5
| 91
|
XML Injection (aka Blind XPath Injection)
|
D-Link DIR-865L has PHP File Inclusion in the router xml file.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-18359
|
2019-10-28 13:31:00
|
2019-10-23 20:15:00
| 4.3
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
A buffer over-read was discovered in ReadMP3APETag in apetag.c in MP3Gain 1.6.2. The vulnerability causes an application crash, which leads to remote denial of service.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-16976
|
2019-10-28 13:09:00
|
2019-10-23 15:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
In FusionPBX up to 4.5.7, the file app\destinations\destination_imports.php uses an unsanitized "query_string" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-16977
|
2019-10-28 13:04:00
|
2019-10-23 17:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
In FusionPBX up to 4.5.7, the file app\extensions\extension_imports.php uses an unsanitized "query_string" variable coming from the URL, which is reflected in HTML, leading to XSS.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2015-9499
|
2019-10-28 12:57:00
|
2019-10-22 21:15:00
| 7.5
| 434
|
Unrestricted Upload of File with Dangerous Type
|
The Showbiz Pro plugin through 1.7.1 for WordPress has PHP code execution by uploading a .php file within a ZIP archive.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-8087
|
2019-10-28 12:52:00
|
2019-10-25 16:15:00
| 5
| 611
|
Improper Restriction of XML External Entity Reference
|
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a xml external entity injection vulnerability. Successful exploitation could lead to sensitive information disclosure.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-8086
|
2019-10-28 12:48:00
|
2019-10-25 16:15:00
| 5
| 611
|
Improper Restriction of XML External Entity Reference
|
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a xml external entity injection vulnerability. Successful exploitation could lead to sensitive information disclosure.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-8082
|
2019-10-28 12:48:00
|
2019-10-25 15:15:00
| 5
| 611
|
Improper Restriction of XML External Entity Reference
|
Adobe Experience Manager versions 6.4, 6.3 and 6.2 have a xml external entity injection vulnerability. Successful exploitation could lead to sensitive information disclosure.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-8085
|
2019-10-28 12:47:00
|
2019-10-25 16:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a reflected cross site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-8081
|
2019-10-28 12:47:00
|
2019-10-25 15:15:00
| 5
| 287
|
Improper Authentication
|
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have an authentication bypass vulnerability. Successful exploitation could lead to sensitive information disclosure.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-8080
|
2019-10-28 12:47:00
|
2019-10-24 18:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Adobe Experience Manager versions 6.4 and 6.3 have a stored cross site scripting vulnerability. Successful exploitation could lead to privilege escalation.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-8079
|
2019-10-28 12:46:00
|
2019-10-24 18:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Adobe Experience Manager versions 6.4, 6.3, 6.2, 6.1, and 6.0 have a stored cross site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-8078
|
2019-10-28 12:46:00
|
2019-10-24 18:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Adobe Experience Manager versions 6.4, 6.3 and 6.2 have a reflected cross site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-8088
|
2019-10-28 12:45:00
|
2019-10-25 16:15:00
| 7.5
| 74
|
Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a command injection vulnerability. Successful exploitation could lead to arbitrary code execution.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-8234
|
2019-10-28 12:43:00
|
2019-10-25 16:15:00
| 4.3
| 352
|
Cross-Site Request Forgery (CSRF)
|
Adobe Experience Manager versions 6.4, 6.3 and 6.2 have a cross-site request forgery vulnerability. Successful exploitation could lead to sensitive information disclosure.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2015-9504
|
2019-10-28 12:42:00
|
2019-10-23 17:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The weeklynews theme before 2.2.9 for WordPress has XSS via the s parameter.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-8084
|
2019-10-28 12:30:00
|
2019-10-25 15:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a reflected cross site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-8083
|
2019-10-28 12:23:00
|
2019-10-25 15:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Adobe Experience Manager versions 6.5, 6.4 and 6.3 have a cross site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-17133
|
2019-10-28 02:15:00
|
2019-10-04 12:15:00
| 7.5
| 120
|
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
|
In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2015-9503
|
2019-10-28 01:11:00
|
2019-10-23 17:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The Modern theme before 1.4.2 for WordPress has XSS via the genericons/example.html anchor identifier.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2015-9502
|
2019-10-28 01:11:00
|
2019-10-23 17:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The Auberge theme before 1.4.5 for WordPress has XSS via the genericons/example.html anchor identifier.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.