Unnamed: 0
stringlengths 13
16
| mod_date
stringdate 2008-01-10 05:00:00
2019-11-21 15:15:00
| pub_date
stringdate 1999-01-01 05:00:00
2019-11-21 15:15:00
| cvss
float64 0
10
| cwe_code
int64 1
1.19k
| cwe_name
stringclasses 170
values | summary
stringlengths 23
3.93k
| access_authentication
stringclasses 3
values | access_complexity
stringclasses 3
values | access_vector
stringclasses 3
values | impact_availability
stringclasses 3
values | impact_confidentiality
stringclasses 3
values | impact_integrity
stringclasses 3
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2019-16698
|
2019-10-21 13:52:00
|
2019-10-16 19:15:00
| 4
| 200
|
Information Exposure
|
The direct_mail (aka Direct Mail) extension through 5.2.2 for TYPO3 has a missing access check in the backend module, allowing a user (with restricted permissions to the fe_users table) to view and export data of frontend users who are subscribed to a newsletter.
|
SINGLE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-13541
|
2019-10-21 13:51:00
|
2019-10-18 19:15:00
| 6.8
| 20
|
Improper Input Validation
|
In Horner Automation Cscape 9.90 and prior, an improper input validation vulnerability has been identified that may be exploited by processing files lacking user input validation. This may allow an attacker to access information and remotely execute arbitrary code.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-16699
|
2019-10-21 13:43:00
|
2019-10-16 19:15:00
| 7.5
| 20
|
Improper Input Validation
|
The sr_freecap (aka freeCap CAPTCHA) extension 2.4.5 and below and 2.5.2 and below for TYPO3 fails to sanitize user input, which allows execution of arbitrary Extbase actions, resulting in Remote Code Execution.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-9745
|
2019-10-21 13:37:00
|
2019-10-14 15:15:00
| 7.2
| 269
|
Improper Privilege Management
|
CloudCTI HIP Integrator Recognition Configuration Tool allows privilege escalation via its EXQUISE integration. This tool communicates with a service (Recognition Update Client Service) via an insecure communication channel (Named Pipe). The data (JSON) sent via this channel is used to import data from CRM software using plugins (.dll files). The plugin to import data from the EXQUISE software (DatasourceExquiseExporter.dll) can be persuaded to start arbitrary programs (including batch files) that are executed using the same privileges as Recognition Update Client Service (NT AUTHORITY\SYSTEM), thus elevating privileges. This occurs because a higher-privileged process executes scripts from a directory writable by a lower-privileged user.
|
NONE
|
LOW
|
LOCAL
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-14810
|
2019-10-21 13:31:00
|
2019-10-10 19:15:00
| 4.3
| 362
|
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
|
A vulnerability has been found in the implementation of the Label Distribution Protocol (LDP) protocol in EOS. Under race conditions, the LDP agent can establish an LDP session with a malicious peer potentially allowing the possibility of a Denial of Service (DoS) attack on route updates and in turn potentially leading to an Out of Memory (OOM) condition that is disruptive to traffic forwarding. Affected EOS versions include: 4.22 release train: 4.22.1F and earlier releases 4.21 release train: 4.21.0F - 4.21.2.3F, 4.21.3F - 4.21.7.1M 4.20 release train: 4.20.14M and earlier releases 4.19 release train: 4.19.12M and earlier releases End of support release trains (4.18 and 4.17)
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-10442
|
2019-10-21 13:26:00
|
2019-10-16 14:15:00
| 4
| 732
|
Incorrect Permission Assignment for Critical Resource
|
A missing permission check in Jenkins iceScrum Plugin 1.1.5 and earlier allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.
|
SINGLE
|
LOW
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-16682
|
2019-10-21 13:15:00
|
2019-10-16 19:15:00
| 7.5
| 89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
The url_redirect (aka URL redirect) extension through 1.2.1 for TYPO3 fails to properly sanitize user input and is susceptible to SQL Injection.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-0075
|
2019-10-21 13:14:00
|
2019-10-09 20:15:00
| 5
| 400
|
Uncontrolled Resource Consumption
|
A vulnerability in the srxpfe process on Protocol Independent Multicast (PIM) enabled SRX series devices may lead to crash of the srxpfe process and an FPC reboot while processing (PIM) messages. Sustained receipt of these packets may lead to an extended denial of service condition. Affected releases are Juniper Networks Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D80; 15.1X49 versions prior to 15.1X49-D160; 17.3 versions prior to 17.3R3-S7 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R2; 18.3 versions prior to 18.3R2.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-0074
|
2019-10-21 13:13:00
|
2019-10-09 20:15:00
| 2.1
| 22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
A path traversal vulnerability in NFX150 Series and QFX10K Series, EX9200 Series, MX Series and PTX Series devices with Next-Generation Routing Engine (NG-RE) allows a local authenticated user to read sensitive system files. This issue only affects NFX150 Series and QFX10K Series, EX9200 Series, MX Series and PTX Series with Next-Generation Routing Engine (NG-RE) which uses vmhost. This issue affects Juniper Networks Junos OS on NFX150 Series and QFX10K, EX9200 Series, MX Series and PTX Series with NG-RE and vmhost: 15.1F versions prior to 15.1F6-S12 16.1 versions starting from 16.1R6 and later releases, including the Service Releases, prior to 16.1R6-S6, 16.1R7-S3; 17.1 versions prior to 17.1R3; 17.2 versions starting from 17.2R1-S3, 17.2R3 and later releases, including the Service Releases, prior to 17.2R3-S1; 17.3 versions starting from 17.3R1-S1, 17.3R2 and later releases, including the Service Releases, prior to 17.3R3-S3; 17.4 versions starting from 17.4R1 and later releases, including the Service Releases, prior to 17.4R1-S6, 17.4R2-S2, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R2; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S2, 18.3R2; 18.4 versions prior to 18.4R1-S1, 18.4R2. This issue does not affect: Juniper Networks Junos OS 15.1 and 16.2.
|
NONE
|
LOW
|
LOCAL
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-10752
|
2019-10-21 13:10:00
|
2019-10-17 19:15:00
| 7.5
| 89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
Sequelize, all versions prior to version 4.44.3 and 5.15.1, is vulnerable to SQL Injection due to sequelize.json() helper function not escaping values properly when formatting sub paths for JSON queries for MySQL, MariaDB and SQLite.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-0063
|
2019-10-21 13:10:00
|
2019-10-09 20:15:00
| 4.3
| 20
|
Improper Input Validation
|
When an MX Series Broadband Remote Access Server (BRAS) is configured as a Broadband Network Gateway (BNG) with DHCPv6 enabled, jdhcpd might crash when receiving a specific crafted DHCP response message on a subscriber interface. The daemon automatically restarts without intervention, but continuous receipt of specific crafted DHCP messages will repeatedly crash jdhcpd, leading to an extended Denial of Service (DoS) condition. This issue only affects systems configured with DHCPv6 enabled. DHCPv4 is unaffected by this issue. This issue affects Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S5 on MX Series; 16.1 versions prior to 16.1R7-S5 on MX Series; 16.2 versions prior to 16.2R2-S10 on MX Series; 17.1 versions prior to 17.1R3-S1 on MX Series; 17.2 versions prior to 17.2R3-S2 on MX Series; 17.3 versions prior to 17.3R3-S6 on MX Series; 17.4 versions prior to 17.4R2-S5, 17.4R3 on MX Series; 18.1 versions prior to 18.1R3-S6 on MX Series; 18.2 versions prior to 18.2R2-S4, 18.2R3 on MX Series; 18.2X75 versions prior to 18.2X75-D50 on MX Series; 18.3 versions prior to 18.3R1-S5, 18.3R3 on MX Series; 18.4 versions prior to 18.4R2 on MX Series; 19.1 versions prior to 19.1R1-S2, 19.1R2 on MX Series.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-0062
|
2019-10-21 13:09:00
|
2019-10-09 20:15:00
| 6.8
| 384
|
Session Fixation
|
A session fixation vulnerability in J-Web on Junos OS may allow an attacker to use social engineering techniques to fix and hijack a J-Web administrators web session and potentially gain administrative access to the device. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S15 on EX Series; 12.3X48 versions prior to 12.3X48-D85 on SRX Series; 14.1X53 versions prior to 14.1X53-D51; 15.1 versions prior to 15.1F6-S13, 15.1R7-S5; 15.1X49 versions prior to 15.1X49-D180 on SRX Series; 15.1X53 versions prior to 15.1X53-D238; 16.1 versions prior to 16.1R4-S13, 16.1R7-S5; 16.2 versions prior to 16.2R2-S10; 17.1 versions prior to 17.1R3-S1; 17.2 versions prior to 17.2R2-S8, 17.2R3-S3; 17.3 versions prior to 17.3R3-S5; 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R3; 18.4 versions prior to 18.4R2; 19.1 versions prior to 19.1R1-S2, 19.1R2.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-0061
|
2019-10-21 13:07:00
|
2019-10-09 20:15:00
| 7.2
| 269
|
Improper Privilege Management
|
The management daemon (MGD) is responsible for all configuration and management operations in Junos OS. The Junos CLI communicates with MGD over an internal unix-domain socket and is granted special permission to open this protected mode socket. Due to a misconfiguration of the internal socket, a local, authenticated user may be able to exploit this vulnerability to gain administrative privileges. This issue only affects Linux-based platforms. FreeBSD-based platforms are unaffected by this vulnerability. Exploitation of this vulnerability requires Junos shell access. This issue cannot be exploited from the Junos CLI. This issue affects Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D171, 15.1X49-D180; 15.1X53 versions prior to 15.1X53-D496, 15.1X53-D69; 16.1 versions prior to 16.1R7-S4; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S6, 17.4R1-S7, 17.4R2-S3, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S4; 18.2 versions prior to 18.2R1-S5, 18.2R2-S2, 18.2R3; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2.
|
NONE
|
LOW
|
LOCAL
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-0072
|
2019-10-21 12:59:00
|
2019-10-09 20:15:00
| 2.1
| 522
|
Insufficiently Protected Credentials
|
An Unprotected Storage of Credentials vulnerability in the identity and access management certificate generation procedure allows a local attacker to gain access to confidential information. This issue affects: Juniper Networks SBR Carrier: 8.4.1 versions prior to 8.4.1R13; 8.5.0 versions prior to 8.5.0R4.
|
NONE
|
LOW
|
LOCAL
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-10436
|
2019-10-21 12:50:00
|
2019-10-16 14:15:00
| 4
| 200
|
Information Exposure
|
An arbitrary file read vulnerability in Jenkins Google OAuth Credentials Plugin 0.9 and earlier allowed attackers able to configure jobs and credentials in Jenkins to obtain the contents of any file on the Jenkins master.
|
SINGLE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-8071
|
2019-10-21 12:35:00
|
2019-10-17 19:15:00
| 7.5
| 732
|
Incorrect Permission Assignment for Critical Resource
|
Adobe Download Manager versions 2.0.0.363 have an insecure file permissions vulnerability. Successful exploitation could lead to privilege escalation.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-15140
|
2019-10-21 11:15:00
|
2019-08-18 19:15:00
| 6.8
| 416
|
Use After Free
|
coders/mat.c in ImageMagick 7.0.8-43 Q16 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by crafting a Matlab image file that is mishandled in ReadImage in MagickCore/constitute.c.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-15139
|
2019-10-21 11:15:00
|
2019-08-18 19:15:00
| 4.3
| 125
|
Out-of-bounds Read
|
The XWD image (X Window System window dumping file) parsing component in ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (application crash resulting from an out-of-bounds Read) in ReadXWDImage in coders/xwd.c by crafting a corrupted XWD image file, a different vulnerability than CVE-2019-11472.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-14981
|
2019-10-21 11:15:00
|
2019-08-12 23:15:00
| 4.3
| 369
|
Divide By Zero
|
In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-17672
|
2019-10-21 00:17:00
|
2019-10-17 13:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
WordPress before 5.2.4 is vulnerable to a stored XSS attack to inject JavaScript into STYLE elements.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-15165
|
2019-10-21 00:15:00
|
2019-10-03 19:15:00
| 5
| 20
|
Improper Input Validation
|
sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2018-19052
|
2019-10-21 00:15:00
|
2018-11-07 05:29:00
| 5
| 22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-17673
|
2019-10-20 23:34:00
|
2019-10-17 13:15:00
| 5
| 20
|
Improper Input Validation
|
WordPress before 5.2.4 is vulnerable to poisoning of the cache of JSON GET requests because certain requests lack a Vary: Origin header.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-17674
|
2019-10-20 23:29:00
|
2019-10-17 13:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
WordPress before 5.2.4 is vulnerable to stored XSS (cross-site scripting) via the Customizer.
|
SINGLE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-0073
|
2019-10-20 22:50:00
|
2019-10-09 20:15:00
| 2.1
| 732
|
Incorrect Permission Assignment for Critical Resource
|
The PKI keys exported using the command "run request security pki key-pair export" on Junos OS may have insecure file permissions. This may allow another user on the Junos OS device with shell access to read them. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D180; 17.3 versions prior to 17.3R3-S7; 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R2; 18.4 versions prior to 18.4R2.
|
NONE
|
LOW
|
LOCAL
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-10447
|
2019-10-20 22:46:00
|
2019-10-16 14:15:00
| 4
| 312
|
Cleartext Storage of Sensitive Information
|
Jenkins Sofy.AI Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
|
SINGLE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-17546
|
2019-10-20 22:43:00
|
2019-10-14 02:15:00
| 6.8
| 190
|
Integer Overflow or Wraparound
|
tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-16522
|
2019-10-20 22:19:00
|
2019-10-16 15:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The eu-cookie-law plugin through 3.0.6 for WordPress (aka EU Cookie Law (GDPR)) is susceptible to Stored XSS due to improper encoding of several configuration options in the admin area and the displayed cookie consent message. This affects Font Color, Background Color, and the Disable Cookie text. An attacker with high privileges can attack other users.
|
SINGLE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-17544
|
2019-10-19 21:15:00
|
2019-10-14 02:15:00
| 6.4
| 125
|
Out-of-bounds Read
|
libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read in acommon::unescape in common/getdata.cpp via an isolated \ character.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
NONE
|
CVE-2019-15258
|
2019-10-18 21:09:00
|
2019-10-16 19:15:00
| 6.8
| 20
|
Improper Input Validation
|
A vulnerability in the web-based management interface of Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper validation of user-supplied requests to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to cause the device to stop responding, requiring manual intervention for recovery.
|
SINGLE
|
LOW
|
NETWORK
|
COMPLETE
|
NONE
|
NONE
|
CVE-2019-10449
|
2019-10-18 21:01:00
|
2019-10-16 14:15:00
| 4
| 312
|
Cleartext Storage of Sensitive Information
|
Jenkins Fortify on Demand Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
|
SINGLE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-2884
|
2019-10-18 20:58:00
|
2019-10-16 18:15:00
| 4.3
| 200
|
Information Exposure
|
Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Segment). The supported version that is affected is 17.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Retail Customer Management and Segmentation Foundation accessible data. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-2935
|
2019-10-18 20:49:00
|
2019-10-16 18:15:00
| 5
| 200
|
Information Exposure
|
Vulnerability in the Siebel UI Framework product of Oracle Siebel CRM (component: EAI). Supported versions that are affected are 19.8 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Siebel UI Framework. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Siebel UI Framework accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-10450
|
2019-10-18 20:47:00
|
2019-10-16 14:15:00
| 2.1
| 312
|
Cleartext Storage of Sensitive Information
|
Jenkins ElasticBox CI Plugin stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
|
NONE
|
LOW
|
LOCAL
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-2923
|
2019-10-18 20:44:00
|
2019-10-16 18:15:00
| 5
| 200
|
Information Exposure
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 5.6.45 and prior and 5.7.27 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-10452
|
2019-10-18 20:42:00
|
2019-10-16 14:15:00
| 4
| 312
|
Cleartext Storage of Sensitive Information
|
Jenkins View26 Test-Reporting Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
|
SINGLE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-10453
|
2019-10-18 20:41:00
|
2019-10-16 14:15:00
| 2.1
| 312
|
Cleartext Storage of Sensitive Information
|
Jenkins Delphix Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
|
NONE
|
LOW
|
LOCAL
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-10446
|
2019-10-18 20:36:00
|
2019-10-16 14:15:00
| 6.4
| 295
|
Improper Certificate Validation
|
Jenkins Cadence vManager Plugin 2.7.0 and earlier disabled SSL/TLS and hostname verification globally for the Jenkins master JVM.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
PARTIAL
|
CVE-2019-10445
|
2019-10-18 20:31:00
|
2019-10-16 14:15:00
| 4
| 732
|
Incorrect Permission Assignment for Critical Resource
|
A missing permission check in Jenkins Google Kubernetes Engine Plugin 0.7.0 and earlier allowed attackers with Overall/Read permission to obtain limited information about the scope of a credential with an attacker-specified credentials ID.
|
SINGLE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-10448
|
2019-10-18 20:28:00
|
2019-10-16 14:15:00
| 4
| 522
|
Insufficiently Protected Credentials
|
Jenkins Extensive Testing Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
|
SINGLE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-10444
|
2019-10-18 20:27:00
|
2019-10-16 14:15:00
| 6.4
| 295
|
Improper Certificate Validation
|
Jenkins Bumblebee HP ALM Plugin 4.1.3 and earlier unconditionally disabled SSL/TLS and hostname verification for connections to HP ALM.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
PARTIAL
|
CVE-2019-16523
|
2019-10-18 20:25:00
|
2019-10-16 15:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The events-manager plugin through 5.9.5 for WordPress (aka Events Manager) is susceptible to Stored XSS due to improper encoding and insertion of data provided to the attribute map_style of shortcodes (locations_map and events_map) provided by the plugin.
|
SINGLE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-16521
|
2019-10-18 20:24:00
|
2019-10-16 15:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The broken-link-checker plugin through 1.11.8 for WordPress (aka Broken Link Checker) is susceptible to Reflected XSS due to improper encoding and insertion of an HTTP GET parameter into HTML. The filter function on the page listing all detected broken links can be exploited by providing an XSS payload in the s_filter GET parameter in a filter_id=search request. NOTE: this is an end-of-life product.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-16520
|
2019-10-18 20:22:00
|
2019-10-16 14:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The all-in-one-seo-pack plugin before 3.2.7 for WordPress (aka All in One SEO Pack) is susceptible to Stored XSS due to improper encoding of the SEO-specific description for posts provided by the plugin via unsafe placeholder replacement.
|
SINGLE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-0071
|
2019-10-18 20:20:00
|
2019-10-09 20:15:00
| 7.2
| 269
|
Improper Privilege Management
|
Veriexec is a kernel-based file integrity subsystem in Junos OS that ensures only authorized binaries are able to be executed. Due to a flaw in specific versions of Junos OS, affecting specific EX Series platforms, the Veriexec subsystem will fail to initialize, in essence disabling file integrity checking. This may allow a locally authenticated user with shell access to install untrusted executable images, and elevate privileges to gain full control of the system. During the installation of an affected version of Junos OS are installed, the following messages will be logged to the console: Initializing Verified Exec: /sbin/veriexec: Undefined symbol "__aeabi_uidiv" /sbin/veriexec: Undefined symbol "__aeabi_uidiv" /sbin/veriexec: Undefined symbol "__aeabi_uidiv" veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/brcm-hr3.dtb: Authentication error veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/contents.izo: Authentication error ... This issue affects Juniper Networks Junos OS: 18.1R3-S4 on EX2300, EX2300-C and EX3400; 18.3R1-S3 on EX2300, EX2300-C and EX3400.
|
NONE
|
LOW
|
LOCAL
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-6474
|
2019-10-18 20:12:00
|
2019-10-16 18:15:00
| 6.1
| 20
|
Improper Input Validation
|
A missing check on incoming client requests can be exploited to cause a situation where the Kea server's lease storage contains leases which are rejected as invalid when the server tries to load leases from storage on restart. If the number of such leases exceeds a hard-coded limit in the Kea code, a server trying to restart will conclude that there is a problem with its lease store and give up. Versions affected: 1.4.0 to 1.5.0, 1.6.0-beta1, and 1.6.0-beta2
|
NONE
|
LOW
|
ADJACENT_NETWORK
|
COMPLETE
|
NONE
|
NONE
|
CVE-2019-15247
|
2019-10-18 20:10:00
|
2019-10-16 19:15:00
| 5.2
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
|
SINGLE
|
LOW
|
ADJACENT_NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-15248
|
2019-10-18 20:07:00
|
2019-10-16 19:15:00
| 5.2
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
|
SINGLE
|
LOW
|
ADJACENT_NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-15249
|
2019-10-18 20:03:00
|
2019-10-16 19:15:00
| 5.2
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
|
SINGLE
|
LOW
|
ADJACENT_NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-15250
|
2019-10-18 19:57:00
|
2019-10-16 19:15:00
| 5.2
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
|
SINGLE
|
LOW
|
ADJACENT_NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-15251
|
2019-10-18 19:52:00
|
2019-10-16 19:15:00
| 5.2
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
|
SINGLE
|
LOW
|
ADJACENT_NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-17607
|
2019-10-18 19:51:00
|
2019-10-16 22:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
HongCMS 3.0.0 has XSS via the install/index.php servername parameter.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-17608
|
2019-10-18 19:45:00
|
2019-10-16 22:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
HongCMS 3.0.0 has XSS via the install/index.php dbname parameter.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-15252
|
2019-10-18 19:43:00
|
2019-10-16 19:15:00
| 5.2
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
|
SINGLE
|
LOW
|
ADJACENT_NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-17609
|
2019-10-18 19:36:00
|
2019-10-16 22:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
HongCMS 3.0.0 has XSS via the install/index.php dbusername parameter.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-17610
|
2019-10-18 19:35:00
|
2019-10-16 22:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
HongCMS 3.0.0 has XSS via the install/index.php dbpassword parameter.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-17611
|
2019-10-18 19:28:00
|
2019-10-16 22:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
HongCMS 3.0.0 has XSS via the install/index.php tableprefix parameter.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-3018
|
2019-10-18 19:24:00
|
2019-10-16 18:15:00
| 3.5
| 20
|
Improper Input Validation
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.17 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
SINGLE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-2215
|
2019-10-18 19:15:00
|
2019-10-11 19:15:00
| 4.6
| 416
|
Use After Free
|
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
|
NONE
|
LOW
|
LOCAL
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-16926
|
2019-10-18 19:15:00
|
2019-09-28 00:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
** DISPUTED ** Flower 0.9.3 has XSS via a crafted worker name. NOTE: The project author stated that he doesn't think this is a valid vulnerability. Worker name and task name aren?t user facing configuration options. They are internal backend config options and person having rights to change them already has full access.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-16746
|
2019-10-18 19:15:00
|
2019-09-24 06:15:00
| 7.5
| 120
|
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
|
An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-16738
|
2019-10-18 19:15:00
|
2019-09-26 02:15:00
| 5
| 200
|
Information Exposure
|
In MediaWiki through 1.33.0, Special:Redirect allows information disclosure of suppressed usernames via a User ID Lookup.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-13336
|
2019-10-18 19:03:00
|
2019-10-08 13:15:00
| 7.5
| 20
|
Improper Input Validation
|
The dbell Wi-Fi Smart Video Doorbell DB01-S Gen 1 allows remote attackers to launch commands with no authentication verification via TCP port 81, because the loginuse and loginpass parameters to openlock.cgi can have arbitrary values. NOTE: the vendor's position is that this product reached end of life in 2016.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-2952
|
2019-10-18 19:00:00
|
2019-10-16 18:15:00
| 5.8
| 863
|
Incorrect Authorization
|
Vulnerability in the Oracle Hospitality Reporting and Analytics component of Oracle Food and Beverage Applications. The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Reporting and Analytics. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Hospitality Reporting and Analytics, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hospitality Reporting and Analytics accessible data as well as unauthorized read access to a subset of Oracle Hospitality Reporting and Analytics accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
PARTIAL
|
PARTIAL
|
CVE-2019-2969
|
2019-10-18 18:33:00
|
2019-10-16 18:15:00
| 2.1
| 200
|
Information Exposure
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 6.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
NONE
|
LOW
|
LOCAL
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-15240
|
2019-10-18 18:21:00
|
2019-10-16 19:15:00
| 5.2
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
|
SINGLE
|
LOW
|
ADJACENT_NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-15241
|
2019-10-18 18:20:00
|
2019-10-16 19:15:00
| 5.2
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
|
SINGLE
|
LOW
|
ADJACENT_NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-15242
|
2019-10-18 18:16:00
|
2019-10-16 19:15:00
| 5.2
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
|
SINGLE
|
LOW
|
ADJACENT_NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-15244
|
2019-10-18 18:15:00
|
2019-10-16 19:15:00
| 5.2
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
|
SINGLE
|
LOW
|
ADJACENT_NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-15243
|
2019-10-18 18:09:00
|
2019-10-16 19:15:00
| 5.2
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
|
SINGLE
|
LOW
|
ADJACENT_NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-15245
|
2019-10-18 18:07:00
|
2019-10-16 19:15:00
| 5.2
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
|
SINGLE
|
LOW
|
ADJACENT_NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-15246
|
2019-10-18 18:06:00
|
2019-10-16 19:15:00
| 5.2
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
|
SINGLE
|
LOW
|
ADJACENT_NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-2887
|
2019-10-18 17:27:00
|
2019-10-16 18:15:00
| 4
| 200
|
Information Exposure
|
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
|
SINGLE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-16925
|
2019-10-18 17:15:00
|
2019-09-28 00:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
** DISPUTED ** Flower 0.9.3 has XSS via the name parameter in an @app.task call. NOTE: The project author stated that he doesn't think this is a valid vulnerability. Worker name and task name aren?t user facing configuration options. They are internal backend config options and person having rights to change them already has full access.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-17408
|
2019-10-18 17:02:00
|
2019-10-14 12:15:00
| 7.5
| 20
|
Improper Input Validation
|
parserIfLabel in inc/zzz_template.php in ZZZCMS zzzphp 1.7.3 allows remote attackers to execute arbitrary code because the danger_key function can be bypassed via manipulations such as strtr.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-17627
|
2019-10-18 17:00:00
|
2019-10-16 12:15:00
| 3.3
| 287
|
Improper Authentication
|
The Yale Bluetooth Key application for mobile devices allows unauthorized unlock actions by sniffing Bluetooth Low Energy (BLE) traffic during one authorized unlock action, and then calculating the authentication key via simple computations on the hex digits of a valid authentication request. This affects the Yale ZEN-R lock and unspecified other locks.
|
NONE
|
LOW
|
ADJACENT_NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-11281
|
2019-10-18 16:55:00
|
2019-10-16 16:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3, contain two components, the virtual host limits page, and the federation management UI, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack that would gain access to virtual hosts and policy management information.
|
SINGLE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2017-1002201
|
2019-10-18 16:55:00
|
2019-10-15 18:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like < > " ' must be escaped properly. In this case, the ' character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing code.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-0069
|
2019-10-18 16:42:00
|
2019-10-09 20:15:00
| 2.1
| 319
|
Cleartext Transmission of Sensitive Information
|
On EX4600, QFX5100 Series, NFX Series, QFX10K Series, QFX5110, QFX5200 Series, QFX5110, QFX5200, QFX10K Series, vSRX, SRX1500, SRX4000 Series, vSRX, SRX1500, SRX4000, QFX5110, QFX5200, QFX10K Series, when the user uses console management port to authenticate, the credentials used during device authentication are written to a log file in clear text. This issue does not affect users that are logging-in using telnet, SSH or J-web to the management IP. This issue affects ACX, NFX, SRX, EX and QFX platforms with the Linux Host OS architecture, it does not affect other SRX and EX platforms that do not use the Linux Host OS architecture. This issue affects Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D110 on vSRX, SRX1500, SRX4000 Series; 15.1X53 versions prior to 15.1X53-D234 on QFX5110, QFX5200 Series; 15.1X53 versions prior to 15.1X53-D68 on QFX10K Series; 17.1 versions prior to 17.1R2-S8, 17.1R3, on QFX5110, QFX5200, QFX10K Series; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3 on QFX5110, QFX5200, QFX10K Series; 17.3 versions prior to 17.3R2 on vSRX, SRX1500, SRX4000, QFX5110, QFX5200, QFX10K Series; 14.1X53 versions prior to 14.1X53-D47 on ACX5000, EX4600, QFX5100 Series; 15.1 versions prior to 15.1R7 on ACX5000, EX4600, QFX5100 Series; 16.1R7 versions prior to 16.1R7 on ACX5000, EX4600, QFX5100 Series; 17.1 versions prior to 17.1R2-S10, 17.1R3 on ACX5000, EX4600, QFX5100 Series; 17.2 versions prior to 17.2R3 on ACX5000, EX4600, QFX5100 Series; 17.3 versions prior to 17.3R3 on ACX5000, EX4600, QFX5100 Series; 17.4 versions prior to 17.4R2 on ACX5000, EX4600, QFX5100 Series; 18.1 versions prior to 18.1R2 on ACX5000, EX4600, QFX5100 Series; 15.1X53 versions prior to 15.1X53-D496 on NFX Series, 17.2 versions prior to 17.2R3-S1 on NFX Series; 17.3 versions prior to 17.3R3-S4 on NFX Series; 17.4 versions prior to 17.4R2-S4, 17.4R3 on NFX Series, 18.1 versions prior to 18.1R3-S4 on NFX Series; 18.2 versions prior to 18.2R2-S3, 18.2R3 on NFX Series; 18.3 versions prior to 18.3R1-S3, 18.3R2 on NFX Series; 18.4 versions prior to 18.4R1-S1, 18.4R2 on NFX Series.
|
NONE
|
LOW
|
LOCAL
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-0068
|
2019-10-18 16:37:00
|
2019-10-09 20:15:00
| 5
| 754
|
Improper Check for Unusual or Exceptional Conditions
|
The SRX flowd process, responsible for packet forwarding, may crash and restart when processing specific multicast packets. By continuously sending the specific multicast packets, an attacker can repeatedly crash the flowd process causing a sustained Denial of Service. This issue affects Juniper Networks Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D90; 15.1X49 versions prior to 15.1X49-D180; 17.3 versions; 17.4 versions prior to 17.4R2-S5, 17.4R3; 18.1 versions prior to 18.1R3-S6; 18.2 versions prior to 18.2R2-S4, 18.2R3; 18.3 versions prior to 18.3R2-S1, 18.3R3; 18.4 versions prior to 18.4R2; 19.1 versions prior to 19.1R1-S1, 19.1R2.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-0067
|
2019-10-18 16:35:00
|
2019-10-09 20:15:00
| 6.1
| 20
|
Improper Input Validation
|
Receipt of a specific link-local IPv6 packet destined to the RE may cause the system to crash and restart (vmcore). By continuously sending a specially crafted IPv6 packet, an attacker can repeatedly crash the system causing a prolonged Denial of Service (DoS). This issue affects Juniper Networks Junos OS: 16.1 versions prior to 16.1R6-S2, 16.1R7; 16.2 versions prior to 16.2R2-S10; 17.1 versions prior to 17.1R3. This issue does not affect Juniper Networks Junos OS version 15.1 and prior versions.
|
NONE
|
LOW
|
ADJACENT_NETWORK
|
COMPLETE
|
NONE
|
NONE
|
CVE-2019-14832
|
2019-10-18 16:33:00
|
2019-10-15 19:15:00
| 6
| 863
|
Incorrect Authorization
|
A flaw was found in the Keycloak REST API before version 8.0.0 where it would permit user access from a realm the user was not configured. An authenticated attacker with knowledge of a user id could use this flaw to access unauthorized information or to carry out further attacks.
|
SINGLE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-0066
|
2019-10-18 16:25:00
|
2019-10-09 20:15:00
| 5
| 20
|
Improper Input Validation
|
An unexpected status return value weakness in the Next-Generation Multicast VPN (NG-mVPN) service of Juniper Networks Junos OS allows attacker to cause a Denial of Service (DoS) condition and core the routing protocol daemon (rpd) process when a specific malformed IPv4 packet is received by the device running BGP. This malformed packet can be crafted and sent to a victim device including when forwarded directly through a device receiving such a malformed packet, but not if the malformed packet is first de-encapsulated from an encapsulated format by a receiving device. Continued receipt of the malformed packet will result in a sustained Denial of Service condition. This issue affects: Juniper Networks Junos OS 15.1 versions prior to 15.1F6-S12, 15.1R7-S2; 15.1X49 versions prior to 15.1X49-D150 on SRX Series; 15.1X53 versions prior to 15.1X53-D68, 15.1X53-D235, 15.1X53-D495, 15.1X53-D590; 16.1 versions prior to 16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2; 16.2 versions prior to 16.2R2-S7; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-0065
|
2019-10-18 16:17:00
|
2019-10-09 20:15:00
| 4.3
| 20
|
Improper Input Validation
|
On MX Series, when the SIP ALG is enabled, receipt of a certain malformed SIP packet may crash the MS-PIC component on MS-MIC or MS-MPC. By continuously sending a crafted SIP packet, an attacker can repeatedly bring down MS-PIC on MS-MIC/MS-MPC causing a sustained Denial of Service. This issue affects Juniper Networks Junos OS on MX Series: 16.1 versions prior to 16.1R7-S5; 16.2 versions prior to 16.2R2-S11; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R3-S3; 17.3 versions prior to 17.3R3-S6 ; 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S3; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R2; 18.4 versions prior to 18.4R2.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-0064
|
2019-10-18 16:12:00
|
2019-10-09 20:15:00
| 4.3
| 20
|
Improper Input Validation
|
On SRX5000 Series devices, if 'set security zones security-zone <zone> tcp-rst' is configured, the flowd process may crash when a specific TCP packet is received by the device and triggers a new session. The process restarts automatically. However, receipt of a constant stream of these TCP packets may result in an extended Denial of Service (DoS) condition on the device. This issue affects Juniper Networks Junos OS: 18.2R3 on SRX 5000 Series; 18.4R2 on SRX 5000 Series; 19.2R1 on SRX 5000 Series.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2016-11014
|
2019-10-18 15:27:00
|
2019-10-16 11:15:00
| 7.5
| 613
|
Insufficient Session Expiration
|
NETGEAR JNR1010 devices before 1.0.0.32 have Incorrect Access Control because the ok value of the auth cookie is a special case.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-2905
|
2019-10-18 15:25:00
|
2019-10-16 18:15:00
| 5
| 200
|
Information Exposure
|
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Installation). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. While the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.0 Base Score 8.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-17373
|
2019-10-18 15:14:00
|
2019-10-09 13:15:00
| 7.5
| 287
|
Improper Authentication
|
Certain NETGEAR devices allow unauthenticated access to critical .cgi and .htm pages via a substring ending with .jpg, such as by appending ?x=1.jpg to a URL. This affects MBR1515, MBR1516, DGN2200, DGN2200M, DGND3700, WNR2000v2, WNDR3300, WNDR3400, WNR3500, and WNR834Bv2.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-17595
|
2019-10-18 15:08:00
|
2019-10-14 21:15:00
| 4.3
| 125
|
Out-of-bounds Read
|
There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-17541
|
2019-10-18 15:04:00
|
2019-10-14 02:15:00
| 6.8
| 416
|
Use After Free
|
ImageMagick before 7.0.8-55 has a use-after-free in DestroyStringInfo in MagickCore/string.c because the error manager is mishandled in coders/jpeg.c.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-17372
|
2019-10-18 14:56:00
|
2019-10-09 13:15:00
| 4.3
| 287
|
Improper Authentication
|
Certain NETGEAR devices allow remote attackers to disable all authentication requirements by visiting genieDisableLanChanged.cgi. The attacker can then, for example, visit MNU_accessPassword_recovered.html to obtain a valid new admin password. This affects AC1450, D8500, DC112A, JNDR3000, LG2200D, R4500, R6200, R6200V2, R6250, R6300, R6300v2, R6400, R6700, R6900P, R6900, R7000P, R7000, R7100LG, R7300, R7900, R8000, R8300, R8500, WGR614v10, WN2500RPv2, WNDR3400v2, WNDR3700v3, WNDR4000, WNDR4500, WNDR4500v2, WNR1000, WNR1000v3, WNR3500L, and WNR3500L.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-14657
|
2019-10-18 14:47:00
|
2019-10-08 13:15:00
| 9
| 434
|
Unrestricted Upload of File with Dangerous Type
|
Yealink phones through 2019-08-04 have an issue with OpenVPN file upload. They execute tar as root to extract files, but do not validate the extraction directory. Creating a tar file with ../../../../ allows replacement of almost any file on a phone. This leads to password replacement and arbitrary code execution as root.
|
SINGLE
|
LOW
|
NETWORK
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-10458
|
2019-10-18 14:47:00
|
2019-10-16 14:15:00
| 6.5
| 20
|
Improper Input Validation
|
Jenkins Puppet Enterprise Pipeline 1.3.1 and earlier specifies unsafe values in its custom Script Security whitelist, allowing attackers able to execute Script Security protected scripts to execute arbitrary code.
|
SINGLE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-17547
|
2019-10-18 14:45:00
|
2019-10-14 02:15:00
| 6.8
| 416
|
Use After Free
|
In ImageMagick before 7.0.8-62, TraceBezier in MagickCore/draw.c has a use-after-free.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-0070
|
2019-10-18 14:40:00
|
2019-10-09 20:15:00
| 7.2
| 20
|
Improper Input Validation
|
An Improper Input Validation weakness allows a malicious local attacker to elevate their permissions to take control of other portions of the NFX platform they should not be able to access, and execute commands outside their authorized scope of control. This leads to the attacker being able to take control of the entire system. This issue affects: Juniper Networks Junos OS versions prior to 18.2R1 on NFX Series.
|
NONE
|
LOW
|
LOCAL
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-17574
|
2019-10-18 14:35:00
|
2019-10-14 14:15:00
| 6.4
| 639
|
Authorization Bypass Through User-Controlled Key
|
An issue was discovered in the Popup Maker plugin before 1.8.13 for WordPress. An unauthenticated attacker can partially control the arguments of the do_action function to invoke certain popmake_ or pum_ methods, as demonstrated by controlling content and delivery of popmake-system-info.txt (aka the "support debug text file").
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
PARTIAL
|
CVE-2019-4031
|
2019-10-18 14:33:00
|
2019-10-16 13:15:00
| 7.2
| 269
|
Improper Privilege Management
|
IBM Workload Scheduler Distributed 9.2, 9.3, 9.4, and 9.5 contains a vulnerability that could allow a local user to write files as root in the file system, which could allow the attacker to gain root privileges. IBM X-Force ID: 155997.
|
NONE
|
LOW
|
LOCAL
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2015-9488
|
2019-10-18 14:33:00
|
2019-10-11 19:15:00
| 5
| 200
|
Information Exposure
|
The ThemeMakers Almera Responsive Portfolio Site Template component through 2015-05-15 for WordPress allows remote attackers to obtain sensitive information (such as user_login, user_pass, and user_email values) via a direct request for the wp-content/uploads/tmm_db_migrate/wp_users.dat URI.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-17043
|
2019-10-18 14:20:00
|
2019-10-14 17:15:00
| 4.6
| 276
|
Incorrect Default Permissions
|
An issue was discovered in BMC Patrol Agent 9.0.10i. Weak execution permissions on the best1collect.exe SUID binary could allow an attacker to elevate his/her privileges to the ones of the "patrol" user by specially crafting a shared library .so file that will be loaded during execution.
|
NONE
|
LOW
|
LOCAL
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2015-9487
|
2019-10-18 14:19:00
|
2019-10-11 19:15:00
| 5
| 200
|
Information Exposure
|
The ThemeMakers Almera Responsive Portfolio theme through 2015-05-15 for WordPress allows remote attackers to obtain sensitive information (such as user_login, user_pass, and user_email values) via a direct request for the wp-content/uploads/tmm_db_migrate/wp_users.dat URI.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.