Unnamed: 0
stringlengths 13
16
| mod_date
stringdate 2008-01-10 05:00:00
2019-11-21 15:15:00
| pub_date
stringdate 1999-01-01 05:00:00
2019-11-21 15:15:00
| cvss
float64 0
10
| cwe_code
int64 1
1.19k
| cwe_name
stringclasses 170
values | summary
stringlengths 23
3.93k
| access_authentication
stringclasses 3
values | access_complexity
stringclasses 3
values | access_vector
stringclasses 3
values | impact_availability
stringclasses 3
values | impact_confidentiality
stringclasses 3
values | impact_integrity
stringclasses 3
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2019-3660
|
2019-11-14 12:30:00
|
2019-11-13 23:15:00
| 6.5
| 74
|
Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
Improper Neutralization of HTTP requests in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to execute commands on the server remotely via carefully constructed HTTP requests.
| null | null | null | null | null | null |
CVE-2019-3650
|
2019-11-14 12:30:00
|
2019-11-13 23:15:00
| 4
| 200
|
Information Exposure
|
Information Disclosure vulnerability in McAfee Advanced Threat Defense (ATD prior to 4.8 allows remote authenticated attackers to gain access to the atduser credentials via carefully constructed GET request extracting insecurely information stored in the database.
| null | null | null | null | null | null |
CVE-2019-3649
|
2019-11-14 12:30:00
|
2019-11-13 23:15:00
| 4
| 200
|
Information Exposure
|
Information Disclosure vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attackers to gain access to hashed credentials via carefully constructed POST request extracting incorrectly recorded data from log files.
| null | null | null | null | null | null |
CVE-2019-3640
|
2019-11-14 12:30:00
|
2019-11-14 00:15:00
| 4
| 522
|
Insufficiently Protected Credentials
|
Unprotected Transport of Credentials in ePO extension in McAfee Data Loss Prevention 11.x prior to 11.4.0 allows remote attackers with access to the network to collect login details to the LDAP server via the ePO extension not using a secure connection when testing LDAP connectivity.
| null | null | null | null | null | null |
CVE-2019-3420
|
2019-11-14 12:30:00
|
2019-11-13 23:15:00
| 3.3
| 200
|
Information Exposure
|
The version V2.5.0_EG1T5_TED of ZTE ZXHN H108N product are impacted by an information leak vulnerability. An attacker could exploit the vulnerability to obtain sensitive information and perform unauthorized operations.
| null | null | null | null | null | null |
CVE-2019-18954
|
2019-11-14 12:30:00
|
2019-11-14 00:15:00
| 5
| 74
|
Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can manipulate internal attributes by adding additional attributes to user input.
| null | null | null | null | null | null |
CVE-2019-18952
|
2019-11-14 12:30:00
|
2019-11-13 23:15:00
| 7.5
| 434
|
Unrestricted Upload of File with Dangerous Type
|
SibSoft Xfilesharing through 2.5.1 allows cgi-bin/up.cgi arbitrary file upload. This can be combined with CVE-2019-18951 to achieve remote code execution via a .html file, containing short codes, that is served over HTTP.
| null | null | null | null | null | null |
CVE-2019-18951
|
2019-11-14 12:30:00
|
2019-11-13 23:15:00
| 5
| 22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
SibSoft Xfilesharing through 2.5.1 allows op=page&tmpl=../ directory traversal to read arbitrary files.
| null | null | null | null | null | null |
CVE-2019-18949
|
2019-11-14 12:30:00
|
2019-11-14 03:15:00
| 5
| 20
|
Improper Input Validation
|
SnowHaze before 2.6.6 is sometimes too late to honor a per-site JavaScript blocking setting, which leads to unintended JavaScript execution via a chain of webpage redirections targeted to the user's browser configuration.
| null | null | null | null | null | null |
CVE-2019-18923
|
2019-11-14 12:30:00
|
2019-11-13 22:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Insufficient content type validation of proxied resources in go-camo before 2.1.1 allows a remote attacker to serve arbitrary content from go-camo's origin.
| null | null | null | null | null | null |
CVE-2019-18240
|
2019-11-14 12:30:00
|
2019-11-13 23:15:00
| 7.5
| 787
|
Out-of-bounds Write
|
In Fuji Electric V-Server 4.0.6 and prior, several heap-based buffer overflows have been identified, which may allow an attacker to remotely execute arbitrary code.
| null | null | null | null | null | null |
CVE-2019-16863
|
2019-11-14 12:30:00
|
2019-11-14 03:15:00
| 4.3
| 327
|
Use of a Broken or Risky Cryptographic Algorithm
|
STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
| null | null | null | null | null | null |
CVE-2019-13555
|
2019-11-14 12:30:00
|
2019-11-13 23:15:00
| 4.3
| 400
|
Uncontrolled Resource Consumption
|
In Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 21081 and prior, MELSEC-L Series L02/06/26CPU, L26CPU-BT: serial number 21101 and prior, L02/06/26CPU-P, L26CPU-PBT: serial number 21101 and prior, and L02/06/26CPU-CM, L26CPU-BT-CM: serial number 21101 and prior, a remote attacker can cause the FTP service to enter a denial-of-service condition dependent on the timing at which a remote attacker connects to the FTP server on the above CPU modules.
| null | null | null | null | null | null |
CVE-2019-0396
|
2019-11-14 12:30:00
|
2019-11-13 23:15:00
| 5.5
| 20
|
Improper Input Validation
|
SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface), corrected in versions 4.1 and 4.2, does not sufficiently validate an XML document accepted from an untrusted source. An attacker can craft a message that contains malicious elements that will not be correctly filtered by Web Intelligence HTML interface in some specific workflows.
| null | null | null | null | null | null |
CVE-2019-0393
|
2019-11-14 12:30:00
|
2019-11-13 22:15:00
| 4
| 89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
An SQL Injection vulnerability in SAP Quality Management (corrected in S4CORE versions 1.0, 1.01, 1.02, 1.03) allows an attacker to carry out targeted database queries that can read individual fields of historical inspection results.
| null | null | null | null | null | null |
CVE-2019-0391
|
2019-11-14 12:30:00
|
2019-11-13 22:15:00
| 4
| 200
|
Information Exposure
|
Under certain conditions SAP NetWeaver AS Java (corrected in 7.10, 7.20, 7.30, 7.31, 7.40, 7.50) allows an attacker to access information which would otherwise be restricted.
| null | null | null | null | null | null |
CVE-2019-0390
|
2019-11-14 12:30:00
|
2019-11-13 22:15:00
| 4
| 200
|
Information Exposure
|
Under certain conditions SAP Data Hub (corrected in DH_Foundation version 2) allows an attacker to access information which would otherwise be restricted. Connection details that are maintained in Connection Manager are visible to users.
| null | null | null | null | null | null |
CVE-2019-0389
|
2019-11-14 12:30:00
|
2019-11-13 22:15:00
| 6.5
| 269
|
Improper Privilege Management
|
An administrator of SAP NetWeaver Application Server Java (J2EE-Framework), (corrected in versions 7.1, 7.2, 7.3, 7.31, 7.4, 7.5), may change privileges for all or some functions in Java Server, and enable users to execute functions, they are not allowed to execute otherwise.
| null | null | null | null | null | null |
CVE-2019-0388
|
2019-11-14 12:30:00
|
2019-11-13 23:15:00
| 5
| 290
|
Authentication Bypass by Spoofing
|
SAP UI5 HTTP Handler (corrected in SAP_UI versions 7.5, 7.51, 7.52, 7.53, 7.54 and SAP UI_700 version 2.0) allows an attacker to manipulate content due to insufficient URL validation.
| null | null | null | null | null | null |
CVE-2019-0386
|
2019-11-14 12:30:00
|
2019-11-13 23:15:00
| 6.5
| 863
|
Incorrect Authorization
|
Order processing in SAP ERP Sales (corrected in SAP_APPL 6.0, 6.02, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18) and S4HANA Sales (corrected in S4CORE 1.0, 1.01, 1.02, 1.03, 1.04) does not execute the required authorization checks for an authenticated user, which can result in an escalation of privileges.
| null | null | null | null | null | null |
CVE-2019-0385
|
2019-11-14 12:30:00
|
2019-11-13 22:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
SAP Enable Now, before version 1908, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
| null | null | null | null | null | null |
CVE-2019-0382
|
2019-11-14 12:30:00
|
2019-11-13 22:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
A Cross-Site Scripting vulnerability exists in SAP BusinessObjects Business Intelligence Platform (Web Intelligence-Publication related pages); corrected in version 4.2. Privileges are required in order to exploit this vulnerability.
| null | null | null | null | null | null |
CVE-2013-3366
|
2019-11-14 12:30:00
|
2019-11-13 22:15:00
| 9.3
| 352
|
Cross-Site Request Forgery (CSRF)
|
Undocumented TELNET service in TRENDnet TEW-812DRU when a web page named backdoor contains an HTML parameter of password and a value of j78G?DFdg_24Mhw3.
| null | null | null | null | null | null |
CVE-2013-3097
|
2019-11-14 12:30:00
|
2019-11-13 22:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Unspecified Cross-site scripting (XSS) vulnerability in the Verizon FIOS Actiontec MI424WR-GEN3I router.
| null | null | null | null | null | null |
CVE-2011-1588
|
2019-11-14 12:30:00
|
2019-11-14 02:15:00
| 6.8
| 134
|
Use of Externally-Controlled Format String
|
Thunar before 1.3.1 could crash when copy and pasting a file name with % format characters due to a format string error.
| null | null | null | null | null | null |
CVE-2011-1490
|
2019-11-14 12:30:00
|
2019-11-14 02:15:00
| 2.1
| 772
|
Missing Release of Resource after Effective Lifetime
|
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset
| null | null | null | null | null | null |
CVE-2011-1489
|
2019-11-14 12:30:00
|
2019-11-14 02:15:00
| 2.1
| 772
|
Missing Release of Resource after Effective Lifetime
|
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages were logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset.
| null | null | null | null | null | null |
CVE-2011-1488
|
2019-11-14 12:30:00
|
2019-11-14 02:15:00
| 1.9
| 772
|
Missing Release of Resource after Effective Lifetime
|
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent within short periods of time.
| null | null | null | null | null | null |
CVE-2011-1145
|
2019-11-14 12:30:00
|
2019-11-14 02:15:00
| 4.6
| 120
|
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
|
The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
| null | null | null | null | null | null |
CVE-2011-1136
|
2019-11-14 12:30:00
|
2019-11-14 01:15:00
| 6.3
| 59
|
Improper Link Resolution Before File Access ('Link Following')
|
In tesseract 2.03 and 2.04, an attacker can rewrite an arbitrary user file by guessing the PID and creating a link to the user's file.
| null | null | null | null | null | null |
CVE-2011-1070
|
2019-11-14 12:30:00
|
2019-11-14 01:15:00
| 7.2
| 863
|
Incorrect Authorization
|
v86d before 0.1.10 do not verify if received netlink messages are sent by the kernel. This could allow unprivileged users to manipulate the video mode and potentially other consequences.
| null | null | null | null | null | null |
CVE-2011-0544
|
2019-11-14 12:30:00
|
2019-11-14 00:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
phpbb 3.0.x-3.0.6 has an XSS vulnerability via the [flash] BB tag.
| null | null | null | null | null | null |
CVE-2010-5108
|
2019-11-14 12:30:00
|
2019-11-13 23:15:00
| 5
| 276
|
Incorrect Default Permissions
|
Trac 0.11.6 does not properly check workflow permissions before modifying a ticket. This can be exploited by an attacker to change the status and resolution of tickets without having proper permissions.
| null | null | null | null | null | null |
CVE-2010-4664
|
2019-11-14 12:30:00
|
2019-11-13 22:15:00
| 6.5
| 269
|
Improper Privilege Management
|
In ConsoleKit before 0.4.2, an intended security policy restriction bypass was found. This flaw allows an authenticated system user to escalate their privileges by initiating a remote VNC session.
| null | null | null | null | null | null |
CVE-2019-17550
|
2019-11-13 21:26:00
|
2019-11-13 21:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The Blog2Social plugin before 5.9.0 for WordPress is affected by: Cross Site Scripting (XSS). The impact is: Allows an attacker to execute arbitrary HTML and JavaScript code via the b2s_id parameter. The component is: views/b2s/post.calendar.php. The attack vector is: When the Administrator is logged in, a reflected XSS may execute upon a click on a malicious URL.
| null | null | null | null | null | null |
CVE-2019-17515
|
2019-11-13 21:26:00
|
2019-11-13 21:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
The CleanTalk cleantalk-spam-protect plugin before 5.127.4 for WordPress is affected by: Cross Site Scripting (XSS). The impact is: Allows an attacker to execute arbitrary HTML and JavaScript code via the from or till parameter. The component is: inc/cleantalk-users.php and inc/cleantalk-comments.php. The attack vector is: When the Administrator is logged in, a reflected XSS may execute upon a click on a malicious URL.
| null | null | null | null | null | null |
CVE-2014-1214
|
2019-11-13 21:26:00
|
2019-11-13 21:15:00
| 6.5
| 434
|
Unrestricted Upload of File with Dangerous Type
|
views/upload.php in the ProJoom Smart Flash Header (NovaSFH) component 3.0.2 and earlier for Joomla! allows remote attackers to upload and execute arbitrary files via a crafted (1) dest parameter and (2) arbitrary extension in the Filename parameter.
| null | null | null | null | null | null |
CVE-2013-4275
|
2019-11-13 21:26:00
|
2019-11-13 21:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Cross-site scripting (XSS) vulnerability in the zen_breadcrumb function in template.php in the Zen theme 6.x-1.x, 7.x-3.x before 7.x-3.2, and 7.x-5.x before 7.x-5.4 for Drupal allows remote authenticated users with the "administer themes" permission to inject arbitrary web script or HTML via the breadcrumb separator field.
| null | null | null | null | null | null |
CVE-2013-3367
|
2019-11-13 21:26:00
|
2019-11-13 21:15:00
| 10
| 287
|
Improper Authentication
|
Undocumented TELNET service in TRENDnet TEW-691GR and TEW-692GR when a web page named backdoor contains an HTML parameter of password and a value of j78G?DFdg_24Mhw3.
| null | null | null | null | null | null |
CVE-2012-5193
|
2019-11-13 21:26:00
|
2019-11-13 21:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Multiple cross-site scripting (XSS) vulnerabilities in Bitweaver 2.8.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the path info to (1) stats/index.php or (2) newsletters/edition.php or the (3) username parameter to users/remind_password.php, (4) days parameter to stats/index.php, (5) login parameter to users/register.php, or (6) highlight parameter.
| null | null | null | null | null | null |
CVE-2011-4972
|
2019-11-13 21:26:00
|
2019-11-13 21:15:00
| 5
| 200
|
Information Exposure
|
hook_file_download in the CKEditor module 7.x-1.4 for Drupal does not properly restrict access to private files, which allows remote attackers to read private files via a direct request.
| null | null | null | null | null | null |
CVE-2010-4661
|
2019-11-13 21:26:00
|
2019-11-13 21:15:00
| 4.6
| 434
|
Unrestricted Upload of File with Dangerous Type
|
udisks before 1.0.3 allows a local user to load arbitrary Linux kernel modules.
| null | null | null | null | null | null |
CVE-2010-4657
|
2019-11-13 21:26:00
|
2019-11-13 21:15:00
| 5
| 772
|
Missing Release of Resource after Effective Lifetime
|
PHP5 before 5.4.4 allows passing invalid utf-8 strings via the xmlTextWriterWriteAttribute, which are then misparsed by libxml2. This results in memory leak into the resulting output.
| null | null | null | null | null | null |
CVE-2019-9467
|
2019-11-13 20:22:00
|
2019-11-13 20:15:00
| 7.2
| 78
|
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
|
In the Bootloader, there is a possible kernel command injection due to missing command sanitization. This could lead to a local elevation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-80316910
| null | null | null | null | null | null |
CVE-2019-9466
|
2019-11-13 20:22:00
|
2019-11-13 20:15:00
| 7.5
| 20
|
Improper Input Validation
|
In the Broadcom Wi-Fi driver, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-130375182
| null | null | null | null | null | null |
CVE-2019-2210
|
2019-11-13 20:22:00
|
2019-11-13 20:15:00
| 7.2
| 120
|
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
|
In load_logging_config of qmi_vs_service.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-139148442
| null | null | null | null | null | null |
CVE-2019-18884
|
2019-11-13 20:22:00
|
2019-11-13 20:15:00
| 6.8
| 352
|
Cross-Site Request Forgery (CSRF)
|
index.php/team_members/add_team_member in RISE Ultimate Project Manager 2.3 has CSRF for adding authorized users.
| null | null | null | null | null | null |
CVE-2019-18844
|
2019-11-13 20:22:00
|
2019-11-13 20:15:00
| 5
| 617
|
Reachable Assertion
|
The Device Model in ACRN before 2019w25.5-140000p relies on assert calls in devicemodel/hw/pci/core.c and devicemodel/include/pci_core.h (instead of other mechanisms for propagating error information or diagnostic information), which might allow attackers to cause a denial of service (assertion failure) within pci core.
| null | null | null | null | null | null |
CVE-2019-18837
|
2019-11-13 20:22:00
|
2019-11-13 20:15:00
| 5
| 59
|
Improper Link Resolution Before File Access ('Link Following')
|
An issue was discovered in crun before 0.10.5. With a crafted image, it doesn't correctly check whether a target is a symlink, resulting in access to files outside of the container. This occurs in libcrun/linux.c and libcrun/chroot_realpath.c.
| null | null | null | null | null | null |
CVE-2013-3516
|
2019-11-13 20:22:00
|
2019-11-13 20:15:00
| 4.3
| 352
|
Cross-Site Request Forgery (CSRF)
|
NETGEAR WNR3500U and WNR3500L routers uses form tokens abased solely on router's current date and time, which allows attackers to guess the CSRF tokens.
| null | null | null | null | null | null |
CVE-2010-4654
|
2019-11-13 20:22:00
|
2019-11-13 20:15:00
| 9.3
| 74
|
Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
poppler before 0.16.3 has malformed commands that may cause corruption of the internal stack.
| null | null | null | null | null | null |
CVE-2010-4653
|
2019-11-13 20:22:00
|
2019-11-13 20:15:00
| 4.3
| 190
|
Integer Overflow or Wraparound
|
An integer overflow condition in poppler before 0.16.3 can occur when parsing CharCodes for fonts.
| null | null | null | null | null | null |
CVE-2019-16951
|
2019-11-13 19:29:00
|
2019-11-13 19:15:00
| 5
| 200
|
Information Exposure
|
A remote file include (RFI) issue was discovered in Enghouse Web Chat 6.2.284.34. One can replace the localhost attribute with one's own domain name. When the product calls this domain after the POST request is sent, it retrieves an attacker's data and displays it. Also worth mentioning is the amount of information sent in the request from this product to the attacker: it reveals information the public should not have. This includes pathnames and internal ip addresses.
| null | null | null | null | null | null |
CVE-2013-3517
|
2019-11-13 19:29:00
|
2019-11-13 19:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Cross-site scripting (XSS) vulnerability in NETGEAR WNR3500U and WNR3500L.
| null | null | null | null | null | null |
CVE-2010-4533
|
2019-11-13 19:29:00
|
2019-11-13 19:15:00
| 7.5
| 295
|
Improper Certificate Validation
|
offlineimap before 6.3.4 added support for SSL server certificate validation but it is still possible to use SSL v2 protocol, which is a flawed protocol with multiple security deficiencies.
| null | null | null | null | null | null |
CVE-2019-2233
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 7.2
| 269
|
Improper Privilege Management
|
In getUserCount and getCount of UserSwitcherController.java, there is possible new user creation due to a logic error. This could lead to local escalation of privilege for an attacker who has physical access to the device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-140486529
| null | null | null | null | null | null |
CVE-2019-2209
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 4.9
| 125
|
Out-of-bounds Read
|
In BTA_DmPinReply of bta_dm_api.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-139287605
| null | null | null | null | null | null |
CVE-2019-2208
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 7.8
| 200
|
Information Exposure
|
There is a possible out of bounds read in v8 JIT code due to a bug in code generation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9Android ID: A-138441919
| null | null | null | null | null | null |
CVE-2019-2207
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 7.2
| 787
|
Out-of-bounds Write
|
In nfa_hci_handle_admin_gate_rsp of nfa_hci_act.cc, there is a possible out of bound write due to missing bounds checks. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-124524315
| null | null | null | null | null | null |
CVE-2019-2206
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 9.3
| 787
|
Out-of-bounds Write
|
In rw_i93_sm_set_read_only of rw_i93.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-139188579
| null | null | null | null | null | null |
CVE-2019-2205
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 10
| 416
|
Use After Free
|
In ProxyResolverV8::SetPacScript of proxy_resolver_v8.cc, there is a possible memory corruption due to a use after free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-139806216
| null | null | null | null | null | null |
CVE-2019-2204
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 10
| 125
|
Out-of-bounds Read
|
In FindSharedFunctionInfo of objects.cc, there is a possible out of bounds read due to a mistake in AST traversal. This could lead to remote code execution in the pacprocessor with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9Android ID: A-138442295
| null | null | null | null | null | null |
CVE-2019-2203
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 7.2
| 787
|
Out-of-bounds Write
|
In CryptoPlugin::decrypt of CryptoPlugin.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-137370777
| null | null | null | null | null | null |
CVE-2019-2202
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 7.2
| 787
|
Out-of-bounds Write
|
In CryptoPlugin::decrypt of CryptoPlugin.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-137283376
| null | null | null | null | null | null |
CVE-2019-2201
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 9.3
| 787
|
Out-of-bounds Write
|
In generate_jsimd_ycc_rgb_convert_neon of jsimd_arm64_neon.S, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-120551338
| null | null | null | null | null | null |
CVE-2019-2199
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 7.2
| 269
|
Improper Privilege Management
|
In createSessionInternal of PackageInstallerService.java, there is a possible permissions bypass. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-138650665
| null | null | null | null | null | null |
CVE-2019-2198
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 4.9
| 89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
In Download Provider, there is a possible SQL injection vulnerability. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-135270103
| null | null | null | null | null | null |
CVE-2019-2197
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 2.1
| 269
|
Improper Privilege Management
|
In processPhonebookAccess of CachedBluetoothDevice.java, there is a possible permission bypass due to an insecure default value. This could lead to local information disclosure of the user's contact list with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-138529441
| null | null | null | null | null | null |
CVE-2019-2196
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 4.9
| 89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
In Download Provider, there is possible SQL injection. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-135269143
| null | null | null | null | null | null |
CVE-2019-2195
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 7.2
| 20
|
Improper Input Validation
|
In tokenize of sqlite3_android.cpp, there is a possible attacker controlled INSERT statement due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-139186193
| null | null | null | null | null | null |
CVE-2019-2193
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 7.2
| 269
|
Improper Privilege Management
|
In WelcomeActivity.java and related files, there is a possible permissions bypass due to a partially provisioned Device Policy Client. This could lead to local escalation of privilege, leaving an Admin app installed with no indication to the user, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-132261064
| null | null | null | null | null | null |
CVE-2019-2192
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 7.2
| 20
|
Improper Input Validation
|
In call of SliceProvider.java, there is a possible permissions bypass due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-138441555
| null | null | null | null | null | null |
CVE-2019-2036
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 10
| 269
|
Improper Privilege Management
|
In okToConnect of HidHostService.java, there is a possible permission bypass due to an incorrect state check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-79703832
| null | null | null | null | null | null |
CVE-2019-18279
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 6.8
| 269
|
Improper Privilege Management
|
In Phoenix SCT WinFlash 1.1.12.0 through 1.5.74.0, the included drivers could be used by a malicious Windows application to gain elevated privileges. Adverse impacts are limited to the Windows environment and there is no known direct impact to the UEFI firmware. This was fixed in late June 2019.
| null | null | null | null | null | null |
CVE-2019-16949
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 4
| 20
|
Improper Input Validation
|
An issue was discovered in Enghouse Web Chat 6.1.300.31 and 6.2.284.34. A user is allowed to send an archive of their chat log to an email address specified at the beginning of the chat (where the user enters in their name and e-mail address). This POST request can be modified to change the message as well as the end recipient of the message. The e-mail address will have the same domain name and user as the product allotted. This can be used in phishing campaigns against users on the same domain.
| null | null | null | null | null | null |
CVE-2010-4532
|
2019-11-13 18:28:00
|
2019-11-13 18:15:00
| 4.3
| 295
|
Improper Certificate Validation
|
offlineimap before 6.3.2 does not check for SSL server certificate validation when "ssl = yes" option is specified which can allow man-in-the-middle attacks.
| null | null | null | null | null | null |
CVE-2019-5294
|
2019-11-13 17:27:00
|
2019-11-13 17:15:00
| 5
| 125
|
Out-of-bounds Read
|
There is an out of bound read vulnerability in some Huawei products. A remote, unauthenticated attacker may send a corrupt or crafted message to the affected products. Due to a buffer read overflow error when parsing the message, successful exploit may cause some service to be abnormal.
| null | null | null | null | null | null |
CVE-2019-5293
|
2019-11-13 17:27:00
|
2019-11-13 17:15:00
| 4
| 772
|
Missing Release of Resource after Effective Lifetime
|
Some Huawei products have a memory leak vulnerability when handling some messages. A remote attacker with operation privilege could exploit the vulnerability by sending specific messages continuously. Successful exploit may cause some service to be abnormal.
| null | null | null | null | null | null |
CVE-2019-5289
|
2019-11-13 17:27:00
|
2019-11-13 17:15:00
| 5
| 125
|
Out-of-bounds Read
|
Gauss100 OLTP database in ManageOne with versions of 6.5.0 have an out-of-bounds read vulnerability due to the insufficient checks of the specific packet length. Attackers can construct invalid packets to attack the active and standby communication channels. Successful exploit of this vulnerability could allow the attacker to crash the database on the standby node.
| null | null | null | null | null | null |
CVE-2019-16948
|
2019-11-13 17:27:00
|
2019-11-13 17:15:00
| 7.5
| 918
|
Server-Side Request Forgery (SSRF)
|
An SSRF issue was discovered in Enghouse Web Chat 6.1.300.31. In any POST request, one can replace the port number at WebServiceLocation=http://localhost:8085/UCWebServices/ with a range of ports to determine what is visible on the internal network (as opposed to what general web traffic would see on the product's host). The response from open ports is different than from closed ports. The product does not allow one to change the protocol: anything except http(s) will throw an error; however, it is the type of error that allows one to determine if a port is open or not.
| null | null | null | null | null | null |
CVE-2014-8167
|
2019-11-13 17:27:00
|
2019-11-13 17:15:00
| 4.3
| 295
|
Improper Certificate Validation
|
vdsm and vdsclient does not validate certficate hostname from another vdsm which could facilitate a man-in-the-middle attack
| null | null | null | null | null | null |
CVE-2012-4385
|
2019-11-13 17:27:00
|
2019-11-13 17:15:00
| 4.3
| 352
|
Cross-Site Request Forgery (CSRF)
|
letodms 3.3.6 has CSRF via change password
| null | null | null | null | null | null |
CVE-2019-5292
|
2019-11-13 16:17:00
|
2019-11-13 16:15:00
| 2.1
| 200
|
Information Exposure
|
Honor 10 Lite, Honor 8A, Huawei Y6 mobile phones with the versions before 9.1.0.217(C00E215R3P1), the versions before 9.1.0.205(C00E97R1P9), the versions before 9.1.0.205(C00E97R2P2) have an information leak vulnerability. Due to improper function error records of some module, an attacker with the access permission may exploit the vulnerability to obtain some information.
| null | null | null | null | null | null |
CVE-2019-18931
|
2019-11-13 16:17:00
|
2019-11-13 16:15:00
| 9
| 120
|
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
|
Western Digital My Cloud EX2 Ultra firmware 2.31.195 allows a Buffer Overflow with Extended Instruction Pointer (EIP) control via crafted GET/POST parameters.
| null | null | null | null | null | null |
CVE-2019-18930
|
2019-11-13 16:17:00
|
2019-11-13 16:15:00
| 9
| 787
|
Out-of-bounds Write
|
Western Digital My Cloud EX2 Ultra firmware 2.31.183 allows web users (including guest account) to remotely execute arbitrary code via a stack-based buffer overflow. There is no size verification logic in one of functions in libscheddl.so, and download_mgr.cgi makes it possible to enter large-sized f_idx inputs.
| null | null | null | null | null | null |
CVE-2019-18929
|
2019-11-13 16:17:00
|
2019-11-13 16:15:00
| 9
| 787
|
Out-of-bounds Write
|
Western Digital My Cloud EX2 Ultra firmware 2.31.183 allows web users (including guest accounts) to remotely execute arbitrary code via a download_mgr.cgi stack-based buffer overflow.
| null | null | null | null | null | null |
CVE-2019-15948
|
2019-11-13 16:17:00
|
2019-11-13 16:15:00
| 5.8
| 120
|
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
|
Texas Instruments CC256x and WL18xx dual-mode Bluetooth controller devices, when LE scan mode is used, allow remote attackers to trigger a buffer overflow via a malformed Bluetooth Low Energy advertising packet, to cause a denial of service or potentially execute arbitrary code. This affects CC256xC-BT-SP 1.2, CC256xB-BT-SP 1.8, and WL18xx-BT-SP 4.4.
| null | null | null | null | null | null |
CVE-2019-5288
|
2019-11-13 15:28:00
|
2019-11-13 15:15:00
| 9.3
| 190
|
Integer Overflow or Wraparound
|
P30 smart phones with versions earlier than ELLE-AL00B 9.1.0.193(C00E190R2P1) have an integer overflow vulnerability due to insufficient check on specific parameters. An attacker tricks the user into installing a malicious application, obtains the root permission and constructs specific parameters to the camera program to exploit this vulnerability. Successful exploit could cause the program to break down or allow for arbitrary code execution.
| null | null | null | null | null | null |
CVE-2019-5287
|
2019-11-13 15:28:00
|
2019-11-13 15:15:00
| 9.3
| 190
|
Integer Overflow or Wraparound
|
P30 smart phones with versions earlier than ELLE-AL00B 9.1.0.193(C00E190R2P1) have an integer overflow vulnerability due to insufficient check on specific parameters. An attacker tricks the user into installing a malicious application, obtains the root permission and constructs specific parameters to the camera program to exploit this vulnerability. Successful exploit could cause the program to break down or allow for arbitrary code execution.
| null | null | null | null | null | null |
CVE-2019-18839
|
2019-11-13 15:28:00
|
2019-11-13 15:15:00
| 8.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
FUDForum 3.0.9 is vulnerable to Stored XSS via the nlogin parameter. This may result in remote code execution. An attacker can use a user account to fully compromise the system using a POST request. When the admin visits the user information, the payload will execute. This will allow for PHP files to be written to the web root, and for code to execute on the remote server.
| null | null | null | null | null | null |
CVE-2019-17524
|
2019-11-13 15:28:00
|
2019-11-13 15:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
An XSS vulnerability on Technicolor TC7300 STFA.51.20 devices allows remote attackers to inject arbitrary web script via the "Connected Clients" field to /wlanAccess.asp. An intranet host can use a crafted hostname to exploit this.
| null | null | null | null | null | null |
CVE-2019-17523
|
2019-11-13 15:28:00
|
2019-11-13 15:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
An XSS vulnerability on Technicolor TC7300 STFA.51.20 devices allows remote attackers to inject arbitrary web script via the FileName parameter to /FTPDiag.asp.
| null | null | null | null | null | null |
CVE-2019-5282
|
2019-11-13 14:20:00
|
2019-11-13 14:15:00
| 6.8
| 415
|
Double Free
|
Bastet module of some Huawei smartphones with Versions earlier than Emily-AL00A 9.0.0.182(C00E82R1P21), Versions earlier than Emily-TL00B 9.0.0.182(C01E82R1P21), Versions earlier than Emily-L09C 9.0.0.203(C432E7R1P11), Versions earlier than Emily-L29C 9.0.0.203(C432E7R1P11), Versions earlier than Emily-L29C 9.0.0.202(C185E2R1P12) have a double free vulnerability. An attacker tricks the user into installing a malicious application, which frees on the same memory address twice. Successful exploit could result in malicious code execution.
| null | null | null | null | null | null |
CVE-2019-5279
|
2019-11-13 14:20:00
|
2019-11-13 14:15:00
| 4.3
| 200
|
Information Exposure
|
Huawei smart phones Emily-L29C with Versions earlier than 9.1.0.311(C10E2R1P13T8), Versions earlier than 9.1.0.311(C461E2R1P11T8), Versions earlier than 9.1.0.316(C635E2R1P11T8), Versions earlier than 9.1.0.311(C185E2R1P12T8), Versions earlier than 9.1.0.311(C605E2R1P12T8), Versions earlier than 9.1.0.311(C636E7R1P13T8) have an information leakage vulnerability. An attacker tricks the user into installing a malicious application, which can copy specific files to the sdcard, resulting in information leakage.
| null | null | null | null | null | null |
CVE-2019-18397
|
2019-11-13 14:20:00
|
2019-11-13 14:15:00
| 6.8
| 120
|
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
|
A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.
| null | null | null | null | null | null |
CVE-2019-3641
|
2019-11-13 14:00:00
|
2019-11-13 11:15:00
| 3.5
| 287
|
Improper Authentication
|
Abuse of Authorization vulnerability in APIs exposed by TIE server in McAfee Threat Intelligence Exchange Server (TIE Server) 3.0.0 allows remote authenticated users to modify stored reputation data via specially crafted messages.
| null | null | null | null | null | null |
CVE-2019-5246
|
2019-11-13 00:15:00
|
2019-11-13 00:15:00
| 4.6
| 345
|
Insufficient Verification of Data Authenticity
|
Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain parameters sufficiently, an attacker should connect to the phone and gain high privilege to launch the attack. Successful exploit could cause DOS or malicious code execution.
| null | null | null | null | null | null |
CVE-2019-5233
|
2019-11-13 00:15:00
|
2019-11-13 00:15:00
| 6.8
| 287
|
Improper Authentication
|
Huawei smartphones with versions earlier than Taurus-AL00B 10.0.0.41(SP2C00E41R3P2) have an improper authentication vulnerability. Successful exploitation may cause the attacker to access specific components.
| null | null | null | null | null | null |
CVE-2019-5231
|
2019-11-13 00:15:00
|
2019-11-13 00:15:00
| 2.1
| 863
|
Incorrect Authorization
|
P30 smartphones with versions earlier than ELLE-AL00B 9.1.0.186(C00E180R2P1) have an improper authorization vulnerability. The software incorrectly performs an authorization check when a user attempts to perform certain action. Successful exploit could allow the attacker to update a crafted package.
| null | null | null | null | null | null |
CVE-2019-5230
|
2019-11-13 00:15:00
|
2019-11-13 00:15:00
| 4.3
| 20
|
Improper Input Validation
|
P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform a properly validation of certain input models, an attacker could trick the user to install a malicious application then craft a malformed model, successful exploit could allow the attacker to get and tamper certain output data information.
| null | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.