Unnamed: 0
stringlengths
13
16
mod_date
stringdate
2008-01-10 05:00:00
2019-11-21 15:15:00
pub_date
stringdate
1999-01-01 05:00:00
2019-11-21 15:15:00
cvss
float64
0
10
cwe_code
int64
1
1.19k
cwe_name
stringclasses
170 values
summary
stringlengths
23
3.93k
access_authentication
stringclasses
3 values
access_complexity
stringclasses
3 values
access_vector
stringclasses
3 values
impact_availability
stringclasses
3 values
impact_confidentiality
stringclasses
3 values
impact_integrity
stringclasses
3 values
CVE-2019-16698
2019-10-21 13:52:00
2019-10-16 19:15:00
4
200
Information Exposure
The direct_mail (aka Direct Mail) extension through 5.2.2 for TYPO3 has a missing access check in the backend module, allowing a user (with restricted permissions to the fe_users table) to view and export data of frontend users who are subscribed to a newsletter.
SINGLE
LOW
NETWORK
NONE
PARTIAL
NONE
CVE-2019-13541
2019-10-21 13:51:00
2019-10-18 19:15:00
6.8
20
Improper Input Validation
In Horner Automation Cscape 9.90 and prior, an improper input validation vulnerability has been identified that may be exploited by processing files lacking user input validation. This may allow an attacker to access information and remotely execute arbitrary code.
NONE
MEDIUM
NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-16699
2019-10-21 13:43:00
2019-10-16 19:15:00
7.5
20
Improper Input Validation
The sr_freecap (aka freeCap CAPTCHA) extension 2.4.5 and below and 2.5.2 and below for TYPO3 fails to sanitize user input, which allows execution of arbitrary Extbase actions, resulting in Remote Code Execution.
NONE
LOW
NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-9745
2019-10-21 13:37:00
2019-10-14 15:15:00
7.2
269
Improper Privilege Management
CloudCTI HIP Integrator Recognition Configuration Tool allows privilege escalation via its EXQUISE integration. This tool communicates with a service (Recognition Update Client Service) via an insecure communication channel (Named Pipe). The data (JSON) sent via this channel is used to import data from CRM software using plugins (.dll files). The plugin to import data from the EXQUISE software (DatasourceExquiseExporter.dll) can be persuaded to start arbitrary programs (including batch files) that are executed using the same privileges as Recognition Update Client Service (NT AUTHORITY\SYSTEM), thus elevating privileges. This occurs because a higher-privileged process executes scripts from a directory writable by a lower-privileged user.
NONE
LOW
LOCAL
COMPLETE
COMPLETE
COMPLETE
CVE-2019-14810
2019-10-21 13:31:00
2019-10-10 19:15:00
4.3
362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
A vulnerability has been found in the implementation of the Label Distribution Protocol (LDP) protocol in EOS. Under race conditions, the LDP agent can establish an LDP session with a malicious peer potentially allowing the possibility of a Denial of Service (DoS) attack on route updates and in turn potentially leading to an Out of Memory (OOM) condition that is disruptive to traffic forwarding. Affected EOS versions include: 4.22 release train: 4.22.1F and earlier releases 4.21 release train: 4.21.0F - 4.21.2.3F, 4.21.3F - 4.21.7.1M 4.20 release train: 4.20.14M and earlier releases 4.19 release train: 4.19.12M and earlier releases End of support release trains (4.18 and 4.17)
NONE
MEDIUM
NETWORK
PARTIAL
NONE
NONE
CVE-2019-10442
2019-10-21 13:26:00
2019-10-16 14:15:00
4
732
Incorrect Permission Assignment for Critical Resource
A missing permission check in Jenkins iceScrum Plugin 1.1.5 and earlier allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.
SINGLE
LOW
NETWORK
NONE
NONE
PARTIAL
CVE-2019-16682
2019-10-21 13:15:00
2019-10-16 19:15:00
7.5
89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The url_redirect (aka URL redirect) extension through 1.2.1 for TYPO3 fails to properly sanitize user input and is susceptible to SQL Injection.
NONE
LOW
NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-0075
2019-10-21 13:14:00
2019-10-09 20:15:00
5
400
Uncontrolled Resource Consumption
A vulnerability in the srxpfe process on Protocol Independent Multicast (PIM) enabled SRX series devices may lead to crash of the srxpfe process and an FPC reboot while processing (PIM) messages. Sustained receipt of these packets may lead to an extended denial of service condition. Affected releases are Juniper Networks Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D80; 15.1X49 versions prior to 15.1X49-D160; 17.3 versions prior to 17.3R3-S7 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R2; 18.3 versions prior to 18.3R2.
NONE
LOW
NETWORK
PARTIAL
NONE
NONE
CVE-2019-0074
2019-10-21 13:13:00
2019-10-09 20:15:00
2.1
22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
A path traversal vulnerability in NFX150 Series and QFX10K Series, EX9200 Series, MX Series and PTX Series devices with Next-Generation Routing Engine (NG-RE) allows a local authenticated user to read sensitive system files. This issue only affects NFX150 Series and QFX10K Series, EX9200 Series, MX Series and PTX Series with Next-Generation Routing Engine (NG-RE) which uses vmhost. This issue affects Juniper Networks Junos OS on NFX150 Series and QFX10K, EX9200 Series, MX Series and PTX Series with NG-RE and vmhost: 15.1F versions prior to 15.1F6-S12 16.1 versions starting from 16.1R6 and later releases, including the Service Releases, prior to 16.1R6-S6, 16.1R7-S3; 17.1 versions prior to 17.1R3; 17.2 versions starting from 17.2R1-S3, 17.2R3 and later releases, including the Service Releases, prior to 17.2R3-S1; 17.3 versions starting from 17.3R1-S1, 17.3R2 and later releases, including the Service Releases, prior to 17.3R3-S3; 17.4 versions starting from 17.4R1 and later releases, including the Service Releases, prior to 17.4R1-S6, 17.4R2-S2, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R2; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S2, 18.3R2; 18.4 versions prior to 18.4R1-S1, 18.4R2. This issue does not affect: Juniper Networks Junos OS 15.1 and 16.2.
NONE
LOW
LOCAL
NONE
PARTIAL
NONE
CVE-2019-10752
2019-10-21 13:10:00
2019-10-17 19:15:00
7.5
89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Sequelize, all versions prior to version 4.44.3 and 5.15.1, is vulnerable to SQL Injection due to sequelize.json() helper function not escaping values properly when formatting sub paths for JSON queries for MySQL, MariaDB and SQLite.
NONE
LOW
NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-0063
2019-10-21 13:10:00
2019-10-09 20:15:00
4.3
20
Improper Input Validation
When an MX Series Broadband Remote Access Server (BRAS) is configured as a Broadband Network Gateway (BNG) with DHCPv6 enabled, jdhcpd might crash when receiving a specific crafted DHCP response message on a subscriber interface. The daemon automatically restarts without intervention, but continuous receipt of specific crafted DHCP messages will repeatedly crash jdhcpd, leading to an extended Denial of Service (DoS) condition. This issue only affects systems configured with DHCPv6 enabled. DHCPv4 is unaffected by this issue. This issue affects Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S5 on MX Series; 16.1 versions prior to 16.1R7-S5 on MX Series; 16.2 versions prior to 16.2R2-S10 on MX Series; 17.1 versions prior to 17.1R3-S1 on MX Series; 17.2 versions prior to 17.2R3-S2 on MX Series; 17.3 versions prior to 17.3R3-S6 on MX Series; 17.4 versions prior to 17.4R2-S5, 17.4R3 on MX Series; 18.1 versions prior to 18.1R3-S6 on MX Series; 18.2 versions prior to 18.2R2-S4, 18.2R3 on MX Series; 18.2X75 versions prior to 18.2X75-D50 on MX Series; 18.3 versions prior to 18.3R1-S5, 18.3R3 on MX Series; 18.4 versions prior to 18.4R2 on MX Series; 19.1 versions prior to 19.1R1-S2, 19.1R2 on MX Series.
NONE
MEDIUM
NETWORK
PARTIAL
NONE
NONE
CVE-2019-0062
2019-10-21 13:09:00
2019-10-09 20:15:00
6.8
384
Session Fixation
A session fixation vulnerability in J-Web on Junos OS may allow an attacker to use social engineering techniques to fix and hijack a J-Web administrators web session and potentially gain administrative access to the device. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S15 on EX Series; 12.3X48 versions prior to 12.3X48-D85 on SRX Series; 14.1X53 versions prior to 14.1X53-D51; 15.1 versions prior to 15.1F6-S13, 15.1R7-S5; 15.1X49 versions prior to 15.1X49-D180 on SRX Series; 15.1X53 versions prior to 15.1X53-D238; 16.1 versions prior to 16.1R4-S13, 16.1R7-S5; 16.2 versions prior to 16.2R2-S10; 17.1 versions prior to 17.1R3-S1; 17.2 versions prior to 17.2R2-S8, 17.2R3-S3; 17.3 versions prior to 17.3R3-S5; 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R3; 18.4 versions prior to 18.4R2; 19.1 versions prior to 19.1R1-S2, 19.1R2.
NONE
MEDIUM
NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-0061
2019-10-21 13:07:00
2019-10-09 20:15:00
7.2
269
Improper Privilege Management
The management daemon (MGD) is responsible for all configuration and management operations in Junos OS. The Junos CLI communicates with MGD over an internal unix-domain socket and is granted special permission to open this protected mode socket. Due to a misconfiguration of the internal socket, a local, authenticated user may be able to exploit this vulnerability to gain administrative privileges. This issue only affects Linux-based platforms. FreeBSD-based platforms are unaffected by this vulnerability. Exploitation of this vulnerability requires Junos shell access. This issue cannot be exploited from the Junos CLI. This issue affects Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D171, 15.1X49-D180; 15.1X53 versions prior to 15.1X53-D496, 15.1X53-D69; 16.1 versions prior to 16.1R7-S4; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S6, 17.4R1-S7, 17.4R2-S3, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S4; 18.2 versions prior to 18.2R1-S5, 18.2R2-S2, 18.2R3; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2.
NONE
LOW
LOCAL
COMPLETE
COMPLETE
COMPLETE
CVE-2019-0072
2019-10-21 12:59:00
2019-10-09 20:15:00
2.1
522
Insufficiently Protected Credentials
An Unprotected Storage of Credentials vulnerability in the identity and access management certificate generation procedure allows a local attacker to gain access to confidential information. This issue affects: Juniper Networks SBR Carrier: 8.4.1 versions prior to 8.4.1R13; 8.5.0 versions prior to 8.5.0R4.
NONE
LOW
LOCAL
NONE
PARTIAL
NONE
CVE-2019-10436
2019-10-21 12:50:00
2019-10-16 14:15:00
4
200
Information Exposure
An arbitrary file read vulnerability in Jenkins Google OAuth Credentials Plugin 0.9 and earlier allowed attackers able to configure jobs and credentials in Jenkins to obtain the contents of any file on the Jenkins master.
SINGLE
LOW
NETWORK
NONE
PARTIAL
NONE
CVE-2019-8071
2019-10-21 12:35:00
2019-10-17 19:15:00
7.5
732
Incorrect Permission Assignment for Critical Resource
Adobe Download Manager versions 2.0.0.363 have an insecure file permissions vulnerability. Successful exploitation could lead to privilege escalation.
NONE
LOW
NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-15140
2019-10-21 11:15:00
2019-08-18 19:15:00
6.8
416
Use After Free
coders/mat.c in ImageMagick 7.0.8-43 Q16 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by crafting a Matlab image file that is mishandled in ReadImage in MagickCore/constitute.c.
NONE
MEDIUM
NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-15139
2019-10-21 11:15:00
2019-08-18 19:15:00
4.3
125
Out-of-bounds Read
The XWD image (X Window System window dumping file) parsing component in ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (application crash resulting from an out-of-bounds Read) in ReadXWDImage in coders/xwd.c by crafting a corrupted XWD image file, a different vulnerability than CVE-2019-11472.
NONE
MEDIUM
NETWORK
PARTIAL
NONE
NONE
CVE-2019-14981
2019-10-21 11:15:00
2019-08-12 23:15:00
4.3
369
Divide By Zero
In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file.
NONE
MEDIUM
NETWORK
PARTIAL
NONE
NONE
CVE-2019-17672
2019-10-21 00:17:00
2019-10-17 13:15:00
4.3
79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
WordPress before 5.2.4 is vulnerable to a stored XSS attack to inject JavaScript into STYLE elements.
NONE
MEDIUM
NETWORK
NONE
NONE
PARTIAL
CVE-2019-15165
2019-10-21 00:15:00
2019-10-03 19:15:00
5
20
Improper Input Validation
sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory.
NONE
LOW
NETWORK
NONE
NONE
PARTIAL
CVE-2018-19052
2019-10-21 00:15:00
2018-11-07 05:29:00
5
22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.
NONE
LOW
NETWORK
NONE
PARTIAL
NONE
CVE-2019-17673
2019-10-20 23:34:00
2019-10-17 13:15:00
5
20
Improper Input Validation
WordPress before 5.2.4 is vulnerable to poisoning of the cache of JSON GET requests because certain requests lack a Vary: Origin header.
NONE
LOW
NETWORK
NONE
NONE
PARTIAL
CVE-2019-17674
2019-10-20 23:29:00
2019-10-17 13:15:00
3.5
79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
WordPress before 5.2.4 is vulnerable to stored XSS (cross-site scripting) via the Customizer.
SINGLE
MEDIUM
NETWORK
NONE
NONE
PARTIAL
CVE-2019-0073
2019-10-20 22:50:00
2019-10-09 20:15:00
2.1
732
Incorrect Permission Assignment for Critical Resource
The PKI keys exported using the command "run request security pki key-pair export" on Junos OS may have insecure file permissions. This may allow another user on the Junos OS device with shell access to read them. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D180; 17.3 versions prior to 17.3R3-S7; 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R2; 18.4 versions prior to 18.4R2.
NONE
LOW
LOCAL
NONE
PARTIAL
NONE
CVE-2019-10447
2019-10-20 22:46:00
2019-10-16 14:15:00
4
312
Cleartext Storage of Sensitive Information
Jenkins Sofy.AI Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
SINGLE
LOW
NETWORK
NONE
PARTIAL
NONE
CVE-2019-17546
2019-10-20 22:43:00
2019-10-14 02:15:00
6.8
190
Integer Overflow or Wraparound
tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
NONE
MEDIUM
NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-16522
2019-10-20 22:19:00
2019-10-16 15:15:00
3.5
79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The eu-cookie-law plugin through 3.0.6 for WordPress (aka EU Cookie Law (GDPR)) is susceptible to Stored XSS due to improper encoding of several configuration options in the admin area and the displayed cookie consent message. This affects Font Color, Background Color, and the Disable Cookie text. An attacker with high privileges can attack other users.
SINGLE
MEDIUM
NETWORK
NONE
NONE
PARTIAL
CVE-2019-17544
2019-10-19 21:15:00
2019-10-14 02:15:00
6.4
125
Out-of-bounds Read
libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read in acommon::unescape in common/getdata.cpp via an isolated \ character.
NONE
LOW
NETWORK
PARTIAL
PARTIAL
NONE
CVE-2019-15258
2019-10-18 21:09:00
2019-10-16 19:15:00
6.8
20
Improper Input Validation
A vulnerability in the web-based management interface of Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper validation of user-supplied requests to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to cause the device to stop responding, requiring manual intervention for recovery.
SINGLE
LOW
NETWORK
COMPLETE
NONE
NONE
CVE-2019-10449
2019-10-18 21:01:00
2019-10-16 14:15:00
4
312
Cleartext Storage of Sensitive Information
Jenkins Fortify on Demand Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
SINGLE
LOW
NETWORK
NONE
PARTIAL
NONE
CVE-2019-2884
2019-10-18 20:58:00
2019-10-16 18:15:00
4.3
200
Information Exposure
Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Segment). The supported version that is affected is 17.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Retail Customer Management and Segmentation Foundation accessible data. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
NONE
MEDIUM
NETWORK
NONE
PARTIAL
NONE
CVE-2019-2935
2019-10-18 20:49:00
2019-10-16 18:15:00
5
200
Information Exposure
Vulnerability in the Siebel UI Framework product of Oracle Siebel CRM (component: EAI). Supported versions that are affected are 19.8 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Siebel UI Framework. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Siebel UI Framework accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
NONE
LOW
NETWORK
NONE
PARTIAL
NONE
CVE-2019-10450
2019-10-18 20:47:00
2019-10-16 14:15:00
2.1
312
Cleartext Storage of Sensitive Information
Jenkins ElasticBox CI Plugin stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
NONE
LOW
LOCAL
NONE
PARTIAL
NONE
CVE-2019-2923
2019-10-18 20:44:00
2019-10-16 18:15:00
5
200
Information Exposure
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 5.6.45 and prior and 5.7.27 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
NONE
LOW
NETWORK
NONE
PARTIAL
NONE
CVE-2019-10452
2019-10-18 20:42:00
2019-10-16 14:15:00
4
312
Cleartext Storage of Sensitive Information
Jenkins View26 Test-Reporting Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
SINGLE
LOW
NETWORK
NONE
PARTIAL
NONE
CVE-2019-10453
2019-10-18 20:41:00
2019-10-16 14:15:00
2.1
312
Cleartext Storage of Sensitive Information
Jenkins Delphix Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
NONE
LOW
LOCAL
NONE
PARTIAL
NONE
CVE-2019-10446
2019-10-18 20:36:00
2019-10-16 14:15:00
6.4
295
Improper Certificate Validation
Jenkins Cadence vManager Plugin 2.7.0 and earlier disabled SSL/TLS and hostname verification globally for the Jenkins master JVM.
NONE
LOW
NETWORK
NONE
PARTIAL
PARTIAL
CVE-2019-10445
2019-10-18 20:31:00
2019-10-16 14:15:00
4
732
Incorrect Permission Assignment for Critical Resource
A missing permission check in Jenkins Google Kubernetes Engine Plugin 0.7.0 and earlier allowed attackers with Overall/Read permission to obtain limited information about the scope of a credential with an attacker-specified credentials ID.
SINGLE
LOW
NETWORK
NONE
PARTIAL
NONE
CVE-2019-10448
2019-10-18 20:28:00
2019-10-16 14:15:00
4
522
Insufficiently Protected Credentials
Jenkins Extensive Testing Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
SINGLE
LOW
NETWORK
NONE
PARTIAL
NONE
CVE-2019-10444
2019-10-18 20:27:00
2019-10-16 14:15:00
6.4
295
Improper Certificate Validation
Jenkins Bumblebee HP ALM Plugin 4.1.3 and earlier unconditionally disabled SSL/TLS and hostname verification for connections to HP ALM.
NONE
LOW
NETWORK
NONE
PARTIAL
PARTIAL
CVE-2019-16523
2019-10-18 20:25:00
2019-10-16 15:15:00
3.5
79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The events-manager plugin through 5.9.5 for WordPress (aka Events Manager) is susceptible to Stored XSS due to improper encoding and insertion of data provided to the attribute map_style of shortcodes (locations_map and events_map) provided by the plugin.
SINGLE
MEDIUM
NETWORK
NONE
NONE
PARTIAL
CVE-2019-16521
2019-10-18 20:24:00
2019-10-16 15:15:00
4.3
79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The broken-link-checker plugin through 1.11.8 for WordPress (aka Broken Link Checker) is susceptible to Reflected XSS due to improper encoding and insertion of an HTTP GET parameter into HTML. The filter function on the page listing all detected broken links can be exploited by providing an XSS payload in the s_filter GET parameter in a filter_id=search request. NOTE: this is an end-of-life product.
NONE
MEDIUM
NETWORK
NONE
NONE
PARTIAL
CVE-2019-16520
2019-10-18 20:22:00
2019-10-16 14:15:00
3.5
79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The all-in-one-seo-pack plugin before 3.2.7 for WordPress (aka All in One SEO Pack) is susceptible to Stored XSS due to improper encoding of the SEO-specific description for posts provided by the plugin via unsafe placeholder replacement.
SINGLE
MEDIUM
NETWORK
NONE
NONE
PARTIAL
CVE-2019-0071
2019-10-18 20:20:00
2019-10-09 20:15:00
7.2
269
Improper Privilege Management
Veriexec is a kernel-based file integrity subsystem in Junos OS that ensures only authorized binaries are able to be executed. Due to a flaw in specific versions of Junos OS, affecting specific EX Series platforms, the Veriexec subsystem will fail to initialize, in essence disabling file integrity checking. This may allow a locally authenticated user with shell access to install untrusted executable images, and elevate privileges to gain full control of the system. During the installation of an affected version of Junos OS are installed, the following messages will be logged to the console: Initializing Verified Exec: /sbin/veriexec: Undefined symbol "__aeabi_uidiv" /sbin/veriexec: Undefined symbol "__aeabi_uidiv" /sbin/veriexec: Undefined symbol "__aeabi_uidiv" veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/brcm-hr3.dtb: Authentication error veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/contents.izo: Authentication error ... This issue affects Juniper Networks Junos OS: 18.1R3-S4 on EX2300, EX2300-C and EX3400; 18.3R1-S3 on EX2300, EX2300-C and EX3400.
NONE
LOW
LOCAL
COMPLETE
COMPLETE
COMPLETE
CVE-2019-6474
2019-10-18 20:12:00
2019-10-16 18:15:00
6.1
20
Improper Input Validation
A missing check on incoming client requests can be exploited to cause a situation where the Kea server's lease storage contains leases which are rejected as invalid when the server tries to load leases from storage on restart. If the number of such leases exceeds a hard-coded limit in the Kea code, a server trying to restart will conclude that there is a problem with its lease store and give up. Versions affected: 1.4.0 to 1.5.0, 1.6.0-beta1, and 1.6.0-beta2
NONE
LOW
ADJACENT_NETWORK
COMPLETE
NONE
NONE
CVE-2019-15247
2019-10-18 20:10:00
2019-10-16 19:15:00
5.2
119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
SINGLE
LOW
ADJACENT_NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-15248
2019-10-18 20:07:00
2019-10-16 19:15:00
5.2
119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
SINGLE
LOW
ADJACENT_NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-15249
2019-10-18 20:03:00
2019-10-16 19:15:00
5.2
119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
SINGLE
LOW
ADJACENT_NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-15250
2019-10-18 19:57:00
2019-10-16 19:15:00
5.2
119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
SINGLE
LOW
ADJACENT_NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-15251
2019-10-18 19:52:00
2019-10-16 19:15:00
5.2
119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
SINGLE
LOW
ADJACENT_NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-17607
2019-10-18 19:51:00
2019-10-16 22:15:00
4.3
79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HongCMS 3.0.0 has XSS via the install/index.php servername parameter.
NONE
MEDIUM
NETWORK
NONE
NONE
PARTIAL
CVE-2019-17608
2019-10-18 19:45:00
2019-10-16 22:15:00
4.3
79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HongCMS 3.0.0 has XSS via the install/index.php dbname parameter.
NONE
MEDIUM
NETWORK
NONE
NONE
PARTIAL
CVE-2019-15252
2019-10-18 19:43:00
2019-10-16 19:15:00
5.2
119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
SINGLE
LOW
ADJACENT_NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-17609
2019-10-18 19:36:00
2019-10-16 22:15:00
4.3
79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HongCMS 3.0.0 has XSS via the install/index.php dbusername parameter.
NONE
MEDIUM
NETWORK
NONE
NONE
PARTIAL
CVE-2019-17610
2019-10-18 19:35:00
2019-10-16 22:15:00
4.3
79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HongCMS 3.0.0 has XSS via the install/index.php dbpassword parameter.
NONE
MEDIUM
NETWORK
NONE
NONE
PARTIAL
CVE-2019-17611
2019-10-18 19:28:00
2019-10-16 22:15:00
4.3
79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HongCMS 3.0.0 has XSS via the install/index.php tableprefix parameter.
NONE
MEDIUM
NETWORK
NONE
NONE
PARTIAL
CVE-2019-3018
2019-10-18 19:24:00
2019-10-16 18:15:00
3.5
20
Improper Input Validation
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.17 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
SINGLE
MEDIUM
NETWORK
PARTIAL
NONE
NONE
CVE-2019-2215
2019-10-18 19:15:00
2019-10-11 19:15:00
4.6
416
Use After Free
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
NONE
LOW
LOCAL
PARTIAL
PARTIAL
PARTIAL
CVE-2019-16926
2019-10-18 19:15:00
2019-09-28 00:15:00
4.3
79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
** DISPUTED ** Flower 0.9.3 has XSS via a crafted worker name. NOTE: The project author stated that he doesn't think this is a valid vulnerability. Worker name and task name aren?t user facing configuration options. They are internal backend config options and person having rights to change them already has full access.
NONE
MEDIUM
NETWORK
NONE
NONE
PARTIAL
CVE-2019-16746
2019-10-18 19:15:00
2019-09-24 06:15:00
7.5
120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.
NONE
LOW
NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-16738
2019-10-18 19:15:00
2019-09-26 02:15:00
5
200
Information Exposure
In MediaWiki through 1.33.0, Special:Redirect allows information disclosure of suppressed usernames via a User ID Lookup.
NONE
LOW
NETWORK
NONE
PARTIAL
NONE
CVE-2019-13336
2019-10-18 19:03:00
2019-10-08 13:15:00
7.5
20
Improper Input Validation
The dbell Wi-Fi Smart Video Doorbell DB01-S Gen 1 allows remote attackers to launch commands with no authentication verification via TCP port 81, because the loginuse and loginpass parameters to openlock.cgi can have arbitrary values. NOTE: the vendor's position is that this product reached end of life in 2016.
NONE
LOW
NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-2952
2019-10-18 19:00:00
2019-10-16 18:15:00
5.8
863
Incorrect Authorization
Vulnerability in the Oracle Hospitality Reporting and Analytics component of Oracle Food and Beverage Applications. The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Reporting and Analytics. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Hospitality Reporting and Analytics, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hospitality Reporting and Analytics accessible data as well as unauthorized read access to a subset of Oracle Hospitality Reporting and Analytics accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
NONE
MEDIUM
NETWORK
NONE
PARTIAL
PARTIAL
CVE-2019-2969
2019-10-18 18:33:00
2019-10-16 18:15:00
2.1
200
Information Exposure
Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 6.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
NONE
LOW
LOCAL
NONE
PARTIAL
NONE
CVE-2019-15240
2019-10-18 18:21:00
2019-10-16 19:15:00
5.2
119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
SINGLE
LOW
ADJACENT_NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-15241
2019-10-18 18:20:00
2019-10-16 19:15:00
5.2
119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
SINGLE
LOW
ADJACENT_NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-15242
2019-10-18 18:16:00
2019-10-16 19:15:00
5.2
119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
SINGLE
LOW
ADJACENT_NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-15244
2019-10-18 18:15:00
2019-10-16 19:15:00
5.2
119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
SINGLE
LOW
ADJACENT_NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-15243
2019-10-18 18:09:00
2019-10-16 19:15:00
5.2
119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
SINGLE
LOW
ADJACENT_NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-15245
2019-10-18 18:07:00
2019-10-16 19:15:00
5.2
119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
SINGLE
LOW
ADJACENT_NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-15246
2019-10-18 18:06:00
2019-10-16 19:15:00
5.2
119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
SINGLE
LOW
ADJACENT_NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-2887
2019-10-18 17:27:00
2019-10-16 18:15:00
4
200
Information Exposure
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
SINGLE
LOW
NETWORK
NONE
PARTIAL
NONE
CVE-2019-16925
2019-10-18 17:15:00
2019-09-28 00:15:00
4.3
79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
** DISPUTED ** Flower 0.9.3 has XSS via the name parameter in an @app.task call. NOTE: The project author stated that he doesn't think this is a valid vulnerability. Worker name and task name aren?t user facing configuration options. They are internal backend config options and person having rights to change them already has full access.
NONE
MEDIUM
NETWORK
NONE
NONE
PARTIAL
CVE-2019-17408
2019-10-18 17:02:00
2019-10-14 12:15:00
7.5
20
Improper Input Validation
parserIfLabel in inc/zzz_template.php in ZZZCMS zzzphp 1.7.3 allows remote attackers to execute arbitrary code because the danger_key function can be bypassed via manipulations such as strtr.
NONE
LOW
NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-17627
2019-10-18 17:00:00
2019-10-16 12:15:00
3.3
287
Improper Authentication
The Yale Bluetooth Key application for mobile devices allows unauthorized unlock actions by sniffing Bluetooth Low Energy (BLE) traffic during one authorized unlock action, and then calculating the authentication key via simple computations on the hex digits of a valid authentication request. This affects the Yale ZEN-R lock and unspecified other locks.
NONE
LOW
ADJACENT_NETWORK
NONE
PARTIAL
NONE
CVE-2019-11281
2019-10-18 16:55:00
2019-10-16 16:15:00
3.5
79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3, contain two components, the virtual host limits page, and the federation management UI, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack that would gain access to virtual hosts and policy management information.
SINGLE
MEDIUM
NETWORK
NONE
NONE
PARTIAL
CVE-2017-1002201
2019-10-18 16:55:00
2019-10-15 18:15:00
4.3
79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like < > " ' must be escaped properly. In this case, the ' character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing code.
NONE
MEDIUM
NETWORK
NONE
NONE
PARTIAL
CVE-2019-0069
2019-10-18 16:42:00
2019-10-09 20:15:00
2.1
319
Cleartext Transmission of Sensitive Information
On EX4600, QFX5100 Series, NFX Series, QFX10K Series, QFX5110, QFX5200 Series, QFX5110, QFX5200, QFX10K Series, vSRX, SRX1500, SRX4000 Series, vSRX, SRX1500, SRX4000, QFX5110, QFX5200, QFX10K Series, when the user uses console management port to authenticate, the credentials used during device authentication are written to a log file in clear text. This issue does not affect users that are logging-in using telnet, SSH or J-web to the management IP. This issue affects ACX, NFX, SRX, EX and QFX platforms with the Linux Host OS architecture, it does not affect other SRX and EX platforms that do not use the Linux Host OS architecture. This issue affects Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D110 on vSRX, SRX1500, SRX4000 Series; 15.1X53 versions prior to 15.1X53-D234 on QFX5110, QFX5200 Series; 15.1X53 versions prior to 15.1X53-D68 on QFX10K Series; 17.1 versions prior to 17.1R2-S8, 17.1R3, on QFX5110, QFX5200, QFX10K Series; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3 on QFX5110, QFX5200, QFX10K Series; 17.3 versions prior to 17.3R2 on vSRX, SRX1500, SRX4000, QFX5110, QFX5200, QFX10K Series; 14.1X53 versions prior to 14.1X53-D47 on ACX5000, EX4600, QFX5100 Series; 15.1 versions prior to 15.1R7 on ACX5000, EX4600, QFX5100 Series; 16.1R7 versions prior to 16.1R7 on ACX5000, EX4600, QFX5100 Series; 17.1 versions prior to 17.1R2-S10, 17.1R3 on ACX5000, EX4600, QFX5100 Series; 17.2 versions prior to 17.2R3 on ACX5000, EX4600, QFX5100 Series; 17.3 versions prior to 17.3R3 on ACX5000, EX4600, QFX5100 Series; 17.4 versions prior to 17.4R2 on ACX5000, EX4600, QFX5100 Series; 18.1 versions prior to 18.1R2 on ACX5000, EX4600, QFX5100 Series; 15.1X53 versions prior to 15.1X53-D496 on NFX Series, 17.2 versions prior to 17.2R3-S1 on NFX Series; 17.3 versions prior to 17.3R3-S4 on NFX Series; 17.4 versions prior to 17.4R2-S4, 17.4R3 on NFX Series, 18.1 versions prior to 18.1R3-S4 on NFX Series; 18.2 versions prior to 18.2R2-S3, 18.2R3 on NFX Series; 18.3 versions prior to 18.3R1-S3, 18.3R2 on NFX Series; 18.4 versions prior to 18.4R1-S1, 18.4R2 on NFX Series.
NONE
LOW
LOCAL
NONE
PARTIAL
NONE
CVE-2019-0068
2019-10-18 16:37:00
2019-10-09 20:15:00
5
754
Improper Check for Unusual or Exceptional Conditions
The SRX flowd process, responsible for packet forwarding, may crash and restart when processing specific multicast packets. By continuously sending the specific multicast packets, an attacker can repeatedly crash the flowd process causing a sustained Denial of Service. This issue affects Juniper Networks Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D90; 15.1X49 versions prior to 15.1X49-D180; 17.3 versions; 17.4 versions prior to 17.4R2-S5, 17.4R3; 18.1 versions prior to 18.1R3-S6; 18.2 versions prior to 18.2R2-S4, 18.2R3; 18.3 versions prior to 18.3R2-S1, 18.3R3; 18.4 versions prior to 18.4R2; 19.1 versions prior to 19.1R1-S1, 19.1R2.
NONE
LOW
NETWORK
PARTIAL
NONE
NONE
CVE-2019-0067
2019-10-18 16:35:00
2019-10-09 20:15:00
6.1
20
Improper Input Validation
Receipt of a specific link-local IPv6 packet destined to the RE may cause the system to crash and restart (vmcore). By continuously sending a specially crafted IPv6 packet, an attacker can repeatedly crash the system causing a prolonged Denial of Service (DoS). This issue affects Juniper Networks Junos OS: 16.1 versions prior to 16.1R6-S2, 16.1R7; 16.2 versions prior to 16.2R2-S10; 17.1 versions prior to 17.1R3. This issue does not affect Juniper Networks Junos OS version 15.1 and prior versions.
NONE
LOW
ADJACENT_NETWORK
COMPLETE
NONE
NONE
CVE-2019-14832
2019-10-18 16:33:00
2019-10-15 19:15:00
6
863
Incorrect Authorization
A flaw was found in the Keycloak REST API before version 8.0.0 where it would permit user access from a realm the user was not configured. An authenticated attacker with knowledge of a user id could use this flaw to access unauthorized information or to carry out further attacks.
SINGLE
MEDIUM
NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-0066
2019-10-18 16:25:00
2019-10-09 20:15:00
5
20
Improper Input Validation
An unexpected status return value weakness in the Next-Generation Multicast VPN (NG-mVPN) service of Juniper Networks Junos OS allows attacker to cause a Denial of Service (DoS) condition and core the routing protocol daemon (rpd) process when a specific malformed IPv4 packet is received by the device running BGP. This malformed packet can be crafted and sent to a victim device including when forwarded directly through a device receiving such a malformed packet, but not if the malformed packet is first de-encapsulated from an encapsulated format by a receiving device. Continued receipt of the malformed packet will result in a sustained Denial of Service condition. This issue affects: Juniper Networks Junos OS 15.1 versions prior to 15.1F6-S12, 15.1R7-S2; 15.1X49 versions prior to 15.1X49-D150 on SRX Series; 15.1X53 versions prior to 15.1X53-D68, 15.1X53-D235, 15.1X53-D495, 15.1X53-D590; 16.1 versions prior to 16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2; 16.2 versions prior to 16.2R2-S7; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3.
NONE
LOW
NETWORK
PARTIAL
NONE
NONE
CVE-2019-0065
2019-10-18 16:17:00
2019-10-09 20:15:00
4.3
20
Improper Input Validation
On MX Series, when the SIP ALG is enabled, receipt of a certain malformed SIP packet may crash the MS-PIC component on MS-MIC or MS-MPC. By continuously sending a crafted SIP packet, an attacker can repeatedly bring down MS-PIC on MS-MIC/MS-MPC causing a sustained Denial of Service. This issue affects Juniper Networks Junos OS on MX Series: 16.1 versions prior to 16.1R7-S5; 16.2 versions prior to 16.2R2-S11; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R3-S3; 17.3 versions prior to 17.3R3-S6 ; 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S3; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R2; 18.4 versions prior to 18.4R2.
NONE
MEDIUM
NETWORK
PARTIAL
NONE
NONE
CVE-2019-0064
2019-10-18 16:12:00
2019-10-09 20:15:00
4.3
20
Improper Input Validation
On SRX5000 Series devices, if 'set security zones security-zone <zone> tcp-rst' is configured, the flowd process may crash when a specific TCP packet is received by the device and triggers a new session. The process restarts automatically. However, receipt of a constant stream of these TCP packets may result in an extended Denial of Service (DoS) condition on the device. This issue affects Juniper Networks Junos OS: 18.2R3 on SRX 5000 Series; 18.4R2 on SRX 5000 Series; 19.2R1 on SRX 5000 Series.
NONE
MEDIUM
NETWORK
PARTIAL
NONE
NONE
CVE-2016-11014
2019-10-18 15:27:00
2019-10-16 11:15:00
7.5
613
Insufficient Session Expiration
NETGEAR JNR1010 devices before 1.0.0.32 have Incorrect Access Control because the ok value of the auth cookie is a special case.
NONE
LOW
NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-2905
2019-10-18 15:25:00
2019-10-16 18:15:00
5
200
Information Exposure
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Installation). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. While the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.0 Base Score 8.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).
NONE
LOW
NETWORK
NONE
PARTIAL
NONE
CVE-2019-17373
2019-10-18 15:14:00
2019-10-09 13:15:00
7.5
287
Improper Authentication
Certain NETGEAR devices allow unauthenticated access to critical .cgi and .htm pages via a substring ending with .jpg, such as by appending ?x=1.jpg to a URL. This affects MBR1515, MBR1516, DGN2200, DGN2200M, DGND3700, WNR2000v2, WNDR3300, WNDR3400, WNR3500, and WNR834Bv2.
NONE
LOW
NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-17595
2019-10-18 15:08:00
2019-10-14 21:15:00
4.3
125
Out-of-bounds Read
There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
NONE
MEDIUM
NETWORK
PARTIAL
NONE
NONE
CVE-2019-17541
2019-10-18 15:04:00
2019-10-14 02:15:00
6.8
416
Use After Free
ImageMagick before 7.0.8-55 has a use-after-free in DestroyStringInfo in MagickCore/string.c because the error manager is mishandled in coders/jpeg.c.
NONE
MEDIUM
NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-17372
2019-10-18 14:56:00
2019-10-09 13:15:00
4.3
287
Improper Authentication
Certain NETGEAR devices allow remote attackers to disable all authentication requirements by visiting genieDisableLanChanged.cgi. The attacker can then, for example, visit MNU_accessPassword_recovered.html to obtain a valid new admin password. This affects AC1450, D8500, DC112A, JNDR3000, LG2200D, R4500, R6200, R6200V2, R6250, R6300, R6300v2, R6400, R6700, R6900P, R6900, R7000P, R7000, R7100LG, R7300, R7900, R8000, R8300, R8500, WGR614v10, WN2500RPv2, WNDR3400v2, WNDR3700v3, WNDR4000, WNDR4500, WNDR4500v2, WNR1000, WNR1000v3, WNR3500L, and WNR3500L.
NONE
MEDIUM
NETWORK
NONE
PARTIAL
NONE
CVE-2019-14657
2019-10-18 14:47:00
2019-10-08 13:15:00
9
434
Unrestricted Upload of File with Dangerous Type
Yealink phones through 2019-08-04 have an issue with OpenVPN file upload. They execute tar as root to extract files, but do not validate the extraction directory. Creating a tar file with ../../../../ allows replacement of almost any file on a phone. This leads to password replacement and arbitrary code execution as root.
SINGLE
LOW
NETWORK
COMPLETE
COMPLETE
COMPLETE
CVE-2019-10458
2019-10-18 14:47:00
2019-10-16 14:15:00
6.5
20
Improper Input Validation
Jenkins Puppet Enterprise Pipeline 1.3.1 and earlier specifies unsafe values in its custom Script Security whitelist, allowing attackers able to execute Script Security protected scripts to execute arbitrary code.
SINGLE
LOW
NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-17547
2019-10-18 14:45:00
2019-10-14 02:15:00
6.8
416
Use After Free
In ImageMagick before 7.0.8-62, TraceBezier in MagickCore/draw.c has a use-after-free.
NONE
MEDIUM
NETWORK
PARTIAL
PARTIAL
PARTIAL
CVE-2019-0070
2019-10-18 14:40:00
2019-10-09 20:15:00
7.2
20
Improper Input Validation
An Improper Input Validation weakness allows a malicious local attacker to elevate their permissions to take control of other portions of the NFX platform they should not be able to access, and execute commands outside their authorized scope of control. This leads to the attacker being able to take control of the entire system. This issue affects: Juniper Networks Junos OS versions prior to 18.2R1 on NFX Series.
NONE
LOW
LOCAL
COMPLETE
COMPLETE
COMPLETE
CVE-2019-17574
2019-10-18 14:35:00
2019-10-14 14:15:00
6.4
639
Authorization Bypass Through User-Controlled Key
An issue was discovered in the Popup Maker plugin before 1.8.13 for WordPress. An unauthenticated attacker can partially control the arguments of the do_action function to invoke certain popmake_ or pum_ methods, as demonstrated by controlling content and delivery of popmake-system-info.txt (aka the "support debug text file").
NONE
LOW
NETWORK
NONE
PARTIAL
PARTIAL
CVE-2019-4031
2019-10-18 14:33:00
2019-10-16 13:15:00
7.2
269
Improper Privilege Management
IBM Workload Scheduler Distributed 9.2, 9.3, 9.4, and 9.5 contains a vulnerability that could allow a local user to write files as root in the file system, which could allow the attacker to gain root privileges. IBM X-Force ID: 155997.
NONE
LOW
LOCAL
COMPLETE
COMPLETE
COMPLETE
CVE-2015-9488
2019-10-18 14:33:00
2019-10-11 19:15:00
5
200
Information Exposure
The ThemeMakers Almera Responsive Portfolio Site Template component through 2015-05-15 for WordPress allows remote attackers to obtain sensitive information (such as user_login, user_pass, and user_email values) via a direct request for the wp-content/uploads/tmm_db_migrate/wp_users.dat URI.
NONE
LOW
NETWORK
NONE
PARTIAL
NONE
CVE-2019-17043
2019-10-18 14:20:00
2019-10-14 17:15:00
4.6
276
Incorrect Default Permissions
An issue was discovered in BMC Patrol Agent 9.0.10i. Weak execution permissions on the best1collect.exe SUID binary could allow an attacker to elevate his/her privileges to the ones of the "patrol" user by specially crafting a shared library .so file that will be loaded during execution.
NONE
LOW
LOCAL
PARTIAL
PARTIAL
PARTIAL
CVE-2015-9487
2019-10-18 14:19:00
2019-10-11 19:15:00
5
200
Information Exposure
The ThemeMakers Almera Responsive Portfolio theme through 2015-05-15 for WordPress allows remote attackers to obtain sensitive information (such as user_login, user_pass, and user_email values) via a direct request for the wp-content/uploads/tmm_db_migrate/wp_users.dat URI.
NONE
LOW
NETWORK
NONE
PARTIAL
NONE