Unnamed: 0
stringlengths 13
16
| mod_date
stringdate 2008-01-10 05:00:00
2019-11-21 15:15:00
| pub_date
stringdate 1999-01-01 05:00:00
2019-11-21 15:15:00
| cvss
float64 0
10
| cwe_code
int64 1
1.19k
| cwe_name
stringclasses 170
values | summary
stringlengths 23
3.93k
| access_authentication
stringclasses 3
values | access_complexity
stringclasses 3
values | access_vector
stringclasses 3
values | impact_availability
stringclasses 3
values | impact_confidentiality
stringclasses 3
values | impact_integrity
stringclasses 3
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2010-3439
|
2019-11-12 20:43:00
|
2019-11-12 20:15:00
| 4
| 20
|
Improper Input Validation
|
It is possible to cause a DoS condition by causing the server to crash in alien-arena 7.33 by supplying various invalid parameters to the download command.
| null | null | null | null | null | null |
CVE-2010-3438
|
2019-11-12 20:43:00
|
2019-11-12 20:15:00
| 7.5
| 134
|
Use of Externally-Controlled Format String
|
libpoe-component-irc-perl before v6.32 does not remove carriage returns and line feeds. This can be used to execute arbitrary IRC commands by passing an argument such as "some text\rQUIT" to the 'privmsg' handler, which would cause the client to disconnect from the server.
| null | null | null | null | null | null |
CVE-2010-3359
|
2019-11-12 20:43:00
|
2019-11-12 19:15:00
| 4.4
| 20
|
Improper Input Validation
|
If LD_LIBRARY_PATH is undefined in gargoyle-free before 2009-08-25, the variable will point to the current directory. This can allow a local user to trick another user into running gargoyle in a directory with a cracked libgarglk.so and gain access to the user's account.
| null | null | null | null | null | null |
CVE-2010-2488
|
2019-11-12 20:43:00
|
2019-11-12 20:15:00
| 5
| 476
|
NULL Pointer Dereference
|
NULL pointer dereference vulnerability in ZNC before 0.092 caused by traffic stats when there are unauthenticated connections.
| null | null | null | null | null | null |
CVE-2019-17360
|
2019-11-12 18:15:00
|
2019-11-12 18:15:00
| 5
| 400
|
Uncontrolled Resource Consumption
|
A vulnerability in Hitachi Command Suite 7.x and 8.x before 8.7.0-00 allows an unauthenticated remote user to trigger a denial of service (DoS) condition because of Uncontrolled Resource Consumption.
| null | null | null | null | null | null |
CVE-2019-15815
|
2019-11-12 18:15:00
|
2019-11-12 18:15:00
| 4
| 863
|
Incorrect Authorization
|
ZyXEL P-1302-T10D v3 devices with firmware version 2.00(ABBX.3) and earlier do not properly enforce access control and could allow an unauthorized user to access certain pages that require admin privileges.
| null | null | null | null | null | null |
CVE-2018-21026
|
2019-11-12 18:15:00
|
2019-11-12 18:15:00
| 5
| 200
|
Information Exposure
|
A vulnerability in Hitachi Command Suite 7.x and 8.x before 8.6.5-00 allows an unauthenticated remote user to read internal information.
| null | null | null | null | null | null |
CVE-2019-18926
|
2019-11-12 17:43:00
|
2019-11-12 17:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Systematic IRIS Standards Management (ISM) v2.1 SP1 89 is vulnerable to unauthenticated reflected Cross Site Scripting (XSS). A user input (related to dialog information) is reflected directly in the web page, allowing a malicious user to conduct a Cross Site Scripting attack against users of the application.
| null | null | null | null | null | null |
CVE-2019-18925
|
2019-11-12 17:43:00
|
2019-11-12 17:15:00
| 7.5
| 287
|
Improper Authentication
|
Systematic IRIS WebForms 5.4 and its functionalities can be accessed and used without any form of authentication.
| null | null | null | null | null | null |
CVE-2019-18924
|
2019-11-12 17:43:00
|
2019-11-12 17:15:00
| 5
| 22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
Systematic IRIS WebForms 5.4 is vulnerable to directory traversal. By manipulating variables that reference files with ../ (and variations), it is possible to list all the directories and check if a particular file exists.
| null | null | null | null | null | null |
CVE-2019-18655
|
2019-11-12 17:43:00
|
2019-11-12 17:15:00
| 10
| 787
|
Out-of-bounds Write
|
File Sharing Wizard version 1.5.0 build 2008 is affected by a Structured Exception Handler based buffer overflow vulnerability. An unauthenticated attacker is able to perform remote command execution and obtain a command shell by sending a HTTP GET request including the malicious payload in the URL. A similar issue to CVE-2019-17415, CVE-2019-16724, and CVE-2010-2331.
| null | null | null | null | null | null |
CVE-2019-17237
|
2019-11-12 17:43:00
|
2019-11-12 17:15:00
| 6.8
| 352
|
Cross-Site Request Forgery (CSRF)
|
includes/class-coming-soon-creator.php in the igniteup plugin through 3.4 for WordPress allows CSRF.
| null | null | null | null | null | null |
CVE-2019-17236
|
2019-11-12 17:43:00
|
2019-11-12 17:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
includes/class-coming-soon-creator.php in the igniteup plugin through 3.4 for WordPress is vulnerable to stored XSS.
| null | null | null | null | null | null |
CVE-2019-17235
|
2019-11-12 17:43:00
|
2019-11-12 17:15:00
| 5
| 200
|
Information Exposure
|
includes/class-coming-soon-creator.php in the igniteup plugin through 3.4 for WordPress allows information disclosure.
| null | null | null | null | null | null |
CVE-2019-17234
|
2019-11-12 17:43:00
|
2019-11-12 17:15:00
| 6.4
| 20
|
Improper Input Validation
|
includes/class-coming-soon-creator.php in the igniteup plugin through 3.4 for WordPress allows unauthenticated arbitrary file deletion.
| null | null | null | null | null | null |
CVE-2012-1572
|
2019-11-12 17:43:00
|
2019-11-12 17:15:00
| 5
| 400
|
Uncontrolled Resource Consumption
|
OpenStack Keystone: extremely long passwords can crash Keystone by exhausting stack space
| null | null | null | null | null | null |
CVE-2019-4652
|
2019-11-12 16:26:00
|
2019-11-12 16:15:00
| 3.6
| 276
|
Incorrect Default Permissions
|
IBM Spectrum Protect Plus 10.1.0 through 10.1.4 uses insecure file permissions on restored files and directories in Windows which could allow a local user to obtain sensitive information or perform unauthorized actions. IBM X-Force ID: 170963.
| null | null | null | null | null | null |
CVE-2019-18848
|
2019-11-12 16:26:00
|
2019-11-12 15:15:00
| 5
| 20
|
Improper Input Validation
|
The json-jwt gem before 1.11.0 for Ruby lacks an element count during the splitting of a JWE string.
| null | null | null | null | null | null |
CVE-2012-1109
|
2019-11-12 16:26:00
|
2019-11-12 15:15:00
| 5
| 755
|
Improper Handling of Exceptional Conditions
|
mwlib 0.13 through 0.13.4 has a denial of service vulnerability when parsing #iferror magic functions
| null | null | null | null | null | null |
CVE-2011-3618
|
2019-11-12 16:26:00
|
2019-11-12 15:15:00
| 4.6
| 59
|
Improper Link Resolution Before File Access ('Link Following')
|
atop: symlink attack possible due to insecure tempfile handling
| null | null | null | null | null | null |
CVE-2019-18817
|
2019-11-12 14:45:00
|
2019-11-12 14:15:00
| 5
| 835
|
Loop with Unreachable Exit Condition ('Infinite Loop')
|
Istio 1.3.x before 1.3.5 allows Denial of Service because continue_on_listener_filters_timeout is set to True, a related issue to CVE-2019-18836.
| null | null | null | null | null | null |
CVE-2019-18658
|
2019-11-12 14:45:00
|
2019-11-12 14:15:00
| 7.5
| 59
|
Improper Link Resolution Before File Access ('Link Following')
|
In Helm 2.x before 2.15.2, commands that deal with loading a chart as a directory or packaging a chart provide an opportunity for a maliciously designed chart to include sensitive content such as /etc/passwd, or to execute a denial of service (DoS) via a special file such as /dev/urandom, via symlinks. No version of Tiller is known to be impacted. This is a client-only issue.
| null | null | null | null | null | null |
CVE-2018-18819
|
2019-11-12 14:45:00
|
2019-11-12 14:15:00
| 5
| 863
|
Incorrect Authorization
|
A vulnerability in the web conference chat component of MiCollab, versions 7.3 PR6 (7.3.0.601) and earlier, and 8.0 (8.0.0.40) through 8.0 SP2 FP2 (8.0.2.202), and MiVoice Business Express versions 7.3 PR3 (7.3.1.302) and earlier, and 8.0 (8.0.0.40) through 8.0 SP2 FP1 (8.0.2.202), could allow creation of unauthorized chat sessions, due to insufficient access controls. A successful exploit could allow execution of arbitrary commands.
| null | null | null | null | null | null |
CVE-2014-7143
|
2019-11-12 14:45:00
|
2019-11-12 14:15:00
| 5
| 295
|
Improper Certificate Validation
|
Python Twisted 14.0 trustRoot is not respected in HTTP client
| null | null | null | null | null | null |
CVE-2014-3599
|
2019-11-12 14:45:00
|
2019-11-12 14:15:00
| 4.3
| 611
|
Improper Restriction of XML External Entity Reference
|
HornetQ REST is vulnerable to XML External Entity due to insecure configuration of RestEasy
| null | null | null | null | null | null |
CVE-2011-5271
|
2019-11-12 14:45:00
|
2019-11-12 14:15:00
| 3.3
| 59
|
Improper Link Resolution Before File Access ('Link Following')
|
Pacemaker before 1.1.6 configure script creates temporary files insecurely
| null | null | null | null | null | null |
CVE-2011-3370
|
2019-11-12 14:45:00
|
2019-11-12 14:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
statusnet before 0.9.9 has XSS
| null | null | null | null | null | null |
CVE-2011-2936
|
2019-11-12 14:45:00
|
2019-11-12 14:15:00
| 7.5
| 89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
Elgg through 1.7.10 has a SQL injection vulnerability
| null | null | null | null | null | null |
CVE-2011-2935
|
2019-11-12 14:45:00
|
2019-11-12 14:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Elgg through 1.7.10 has XSS
| null | null | null | null | null | null |
CVE-2011-2897
|
2019-11-12 14:45:00
|
2019-11-12 14:15:00
| 7.5
| 20
|
Improper Input Validation
|
gdk-pixbuf through 2.31.1 has GIF loader buffer overflow when initializing decompression tables due to an input validation flaw
| null | null | null | null | null | null |
CVE-2019-18882
|
2019-11-12 03:15:00
|
2019-11-12 03:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
WSO2 IS as Key Manager 5.7.0 allows stored XSS in download-userinfo.jag because Content-Type is mishandled.
| null | null | null | null | null | null |
CVE-2019-18881
|
2019-11-12 03:15:00
|
2019-11-12 03:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
WSO2 IS as Key Manager 5.7.0 allows unauthenticated reflected XSS in the dashboard user profile.
| null | null | null | null | null | null |
CVE-2019-18874
|
2019-11-12 02:15:00
|
2019-11-12 02:15:00
| 5
| 415
|
Double Free
|
psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object.
| null | null | null | null | null | null |
CVE-2019-18873
|
2019-11-12 02:15:00
|
2019-11-12 02:15:00
| 8.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
FUDForum 3.0.9 is vulnerable to Stored XSS via the User-Agent HTTP header. This may result in remote code execution. An attacker can use a user account to fully compromise the system via a GET request. When the admin visits user information under "User Manager" in the control panel, the payload will execute. This will allow for PHP files to be written to the web root, and for code to execute on the remote server. The problem is in admsession.php and admuser.php.
| null | null | null | null | null | null |
CVE-2019-18862
|
2019-11-11 16:15:00
|
2019-11-11 16:15:00
| 4.6
| 269
|
Improper Privilege Management
|
maidag in GNU Mailutils before 3.8 is installed setuid and allows local privilege escalation in the url mode.
| null | null | null | null | null | null |
CVE-2019-18857
|
2019-11-11 15:15:00
|
2019-11-11 15:15:00
| 5
| 20
|
Improper Input Validation
|
darylldoyle svg-sanitizer before 0.12.0 mishandles script and data values in attributes, as demonstrated by unexpected whitespace such as in the javascript	:alert substring.
| null | null | null | null | null | null |
CVE-2019-18856
|
2019-11-11 15:15:00
|
2019-11-11 15:15:00
| 5
| 20
|
Improper Input Validation
|
A Denial Of Service vulnerability exists in the SVG Sanitizer module through 8.x-1.0-alpha1 for Drupal because access to external resources with an SVG use element is mishandled.
| null | null | null | null | null | null |
CVE-2019-18855
|
2019-11-11 15:15:00
|
2019-11-11 15:15:00
| 5
| 20
|
Improper Input Validation
|
A Denial Of Service vulnerability exists in the safe-svg (aka Safe SVG) plugin through 1.9.4 for WordPress, related to potentially unwanted elements or attributes.
| null | null | null | null | null | null |
CVE-2019-18854
|
2019-11-11 15:15:00
|
2019-11-11 15:15:00
| 5
| 674
|
Uncontrolled Recursion
|
A Denial Of Service vulnerability exists in the safe-svg (aka Safe SVG) plugin through 1.9.4 for WordPress, related to unlimited recursion for a '<use ... xlink:href="#identifier">' substring.
| null | null | null | null | null | null |
CVE-2019-18853
|
2019-11-11 15:15:00
|
2019-11-11 15:15:00
| 4.3
| 20
|
Improper Input Validation
|
ImageMagick before 7.0.9-0 allows remote attackers to cause a denial of service because XML_PARSE_HUGE is not properly restricted in coders/svg.c, related to SVG and libxml2.
| null | null | null | null | null | null |
CVE-2019-18852
|
2019-11-11 14:15:00
|
2019-11-11 14:15:00
| 10
| 798
|
Use of Hard-coded Credentials
|
Certain D-Link devices have a hardcoded Alphanetworks user account with TELNET access because of /etc/config/image_sign or /etc/alpha_config/image_sign. This affects DIR-600 B1 V2.01 for WW, DIR-890L A1 v1.03, DIR-615 J1 v100 (for DCN), DIR-645 A1 v1.03, DIR-815 A1 v1.01, DIR-823 A1 v1.01, and DIR-842 C1 v3.00.
| null | null | null | null | null | null |
CVE-2019-18849
|
2019-11-11 04:15:00
|
2019-11-11 04:15:00
| 4.3
| 125
|
Out-of-bounds Read
|
In tnef before 1.4.18, an attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message with a crafted winmail.dat application/ms-tnef attachment, because of a heap-based buffer over-read involving strdup.
| null | null | null | null | null | null |
CVE-2019-18841
|
2019-11-11 01:15:00
|
2019-11-11 01:15:00
| 7.5
| 20
|
Improper Input Validation
|
Chartkick.js 3.1.0 through 3.1.3, as used in the Chartkick gem before 3.3.0 for Ruby, allows prototype pollution.
| null | null | null | null | null | null |
CVE-2019-18836
|
2019-11-11 01:15:00
|
2019-11-11 01:15:00
| 5
| 835
|
Loop with Unreachable Exit Condition ('Infinite Loop')
|
Envoy 1.12.0 allows a remote denial of service because of resource loops, as demonstrated by a single idle TCP connection being able to keep a worker thread in an infinite busy loop when continue_on_listener_filters_timeout is used."
| null | null | null | null | null | null |
CVE-2019-18845
|
2019-11-09 18:15:00
|
2019-11-09 18:15:00
| 3.6
| 269
|
Improper Privilege Management
|
The MsIo64.sys and MsIo32.sys drivers in Patriot Viper RGB before 1.1 allow local users (including low integrity processes) to read and write to arbitrary memory locations, and consequently gain NT AUTHORITY\SYSTEM privileges, by mapping \Device\PhysicalMemory into the calling process via ZwOpenSection and ZwMapViewOfSection.
| null | null | null | null | null | null |
CVE-2019-18840
|
2019-11-09 13:15:00
|
2019-11-09 13:15:00
| 5
| 787
|
Out-of-bounds Write
|
In wolfSSL 4.1.0 through 4.2.0c, there are missing sanity checks of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer overflow inside the DecodedCert structure in GetName in wolfcrypt/src/asn.c because the domain name location index is mishandled. Because a pointer is overwritten, there is an invalid free.
| null | null | null | null | null | null |
CVE-2009-5004
|
2019-11-09 04:15:00
|
2019-11-09 04:15:00
| 4
| 20
|
Improper Input Validation
|
qpid-cpp 1.0 crashes when a large message is sent and the Digest-MD5 mechanism with a security layer is in use .
| null | null | null | null | null | null |
CVE-2009-4011
|
2019-11-09 03:15:00
|
2019-11-09 03:15:00
| 6.8
| 362
|
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
|
dtc-xen 0.5.x before 0.5.4 suffers from a race condition where an attacker could potentially get a bash access as xenXX user on the dom0, and then access a potentially reuse an already opened VPS console.
| null | null | null | null | null | null |
CVE-2009-3614
|
2019-11-09 03:15:00
|
2019-11-09 03:15:00
| 2.1
| 20
|
Improper Input Validation
|
liboping 1.3.2 allows users reading arbitrary files upon the local system.
| null | null | null | null | null | null |
CVE-2009-3552
|
2019-11-09 03:15:00
|
2019-11-09 03:15:00
| 2.9
| 295
|
Improper Certificate Validation
|
In RHEV-M VDC 2.2.0, it was found that the SSL certificate was not verified when using the client-side Red Hat Enterprise Virtualization Manager interface (a Windows Presentation Foundation (WPF) XAML browser application) to connect to the Red Hat Enterprise Virtualization Manager. An attacker on the local network could use this flaw to conduct a man-in-the-middle attack, tricking the user into thinking they are viewing the Red Hat Enterprise Virtualization Manager when the content is actually attacker-controlled, or modifying actions a user requested Red Hat Enterprise Virtualization Manager to perform.
| null | null | null | null | null | null |
CVE-2009-2802
|
2019-11-09 03:15:00
|
2019-11-09 03:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
MantisBT 1.2.x before 1.2.2 insecurely handles attachments and MIME types. Arbitrary inline attachment rendering could lead to cross-domain scripting or other browser attacks.
| null | null | null | null | null | null |
CVE-2009-0035
|
2019-11-09 03:15:00
|
2019-11-09 03:15:00
| 3.6
| 59
|
Improper Link Resolution Before File Access ('Link Following')
|
alsa-utils 1.0.19 and later versions allows local users to overwrite arbitrary files via a symlink attack via the /usr/bin/alsa-info and /usr/bin/alsa-info.sh scripts.
| null | null | null | null | null | null |
CVE-2019-5701
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 4.4
| 426
|
Untrusted Search Path
|
NVIDIA GeForce Experience, all versions prior to 3.20.1, contains a vulnerability when GameStream is enabled in which an attacker with local system access can load the Intel graphics driver DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service, information disclosure, or escalation of privileges through code execution.
| null | null | null | null | null | null |
CVE-2019-5698
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 2.1
| 20
|
Improper Input Validation
|
NVIDIA Virtual GPU Manager, all versions, contains a vulnerability in the vGPU plugin, in which an input index value is incorrectly validated, which may lead to denial of service.
| null | null | null | null | null | null |
CVE-2019-5697
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 3.6
| 863
|
Incorrect Authorization
|
NVIDIA Virtual GPU Manager, all versions, contains a vulnerability in which it may grant a guest access to memory that it does not own, which may lead to information disclosure or denial of service.
| null | null | null | null | null | null |
CVE-2019-5696
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 2.1
| 125
|
Out-of-bounds Read
|
NVIDIA Virtual GPU Manager, all versions, contains a vulnerability in which the provision of an incorrectly sized buffer by a guest VM leads to GPU out-of-bound access, which may lead to a denial of service.
| null | null | null | null | null | null |
CVE-2019-5694
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 4.4
| 426
|
Untrusted Search Path
|
NVIDIA Windows GPU Display Driver, R390 driver version, contains a vulnerability in NVIDIA Control Panel in which it incorrectly loads Windows system DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service or information disclosure through code execution. The attacker requires local system access.
| null | null | null | null | null | null |
CVE-2019-5693
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 4.9
| 824
|
Access of Uninitialized Pointer
|
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) in which the program accesses or uses a pointer that has not been initialized, which may lead to denial of service.
| null | null | null | null | null | null |
CVE-2019-5692
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 7.2
| 20
|
Improper Input Validation
|
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which the product uses untrusted input when calculating or using an array index, which may lead to escalation of privileges or denial of service.
| null | null | null | null | null | null |
CVE-2019-5691
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 7.2
| 476
|
NULL Pointer Dereference
|
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which a NULL pointer is dereferenced, which may lead to denial of service or escalation of privileges.
| null | null | null | null | null | null |
CVE-2019-5690
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 7.2
| 20
|
Improper Input Validation
|
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which the size of an input buffer is not validated, which may lead to denial of service or escalation of privileges.
| null | null | null | null | null | null |
CVE-2019-5689
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 4.6
| 20
|
Improper Input Validation
|
NVIDIA GeForce Experience, all versions prior to 3.20.1, contains a vulnerability in the Downloader component in which a user with local system access can craft input that may allow malicious files to be downloaded and saved. This behavior may lead to code execution, denial of service, or information disclosure.
| null | null | null | null | null | null |
CVE-2019-4645
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
IBM Cognos Analytics 11.0 and 11.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 170881.
| null | null | null | null | null | null |
CVE-2019-4581
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
IBM QRadar 7.3.0 to 7.3.2 Patch 4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 167239.
| null | null | null | null | null | null |
CVE-2019-4556
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 4
| 20
|
Improper Input Validation
|
IBM QRadar Advisor 1.0.0 through 2.4.0 uses incomplete blacklisting for input validation which allows attackers to bypass application controls resulting in direct impact to the system and data integrity. IBM X-Force ID: 166205.
| null | null | null | null | null | null |
CVE-2019-4509
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 4
| 863
|
Incorrect Authorization
|
IBM QRadar 7.3.0 to 7.3.2 Patch 4 is vulnerable to incorrect authorization in some components which could allow an authenticated user to obtain sensitive information. IBM X-Force ID: 164430.
| null | null | null | null | null | null |
CVE-2019-4470
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
IBM QRadar 7.3.0 to 7.3.2 Patch 4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 163779.
| null | null | null | null | null | null |
CVE-2019-4454
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
IBM QRadar 7.3.0 to 7.3.2 Patch 4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 163618.
| null | null | null | null | null | null |
CVE-2019-4450
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
IBM i 7.2, 7.3, and 7.4 for i is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 163492.
| null | null | null | null | null | null |
CVE-2019-4412
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 5
| 200
|
Information Exposure
|
IBM Cognos Controller stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 162659.
| null | null | null | null | null | null |
CVE-2019-4411
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 4
| 200
|
Information Exposure
|
IBM Cognos Controller 10.3.0, 10.3.1, 10.4.0, and 10.4.1 could allow an authenticated user to obtain sensitive information due to easy to guess session identifier names. IBM X-Force ID: 162658.
| null | null | null | null | null | null |
CVE-2019-4334
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 4
| 200
|
Information Exposure
|
IBM Cognos Analytics 11.0 and 11.1 could reveal sensitive information to an authenticated user that could be used in future attacks against the system. IBM X-Force ID: 161271.
| null | null | null | null | null | null |
CVE-2018-1721
|
2019-11-09 02:15:00
|
2019-11-09 02:15:00
| 6.5
| 91
|
XML Injection (aka Blind XPath Injection)
|
IBM Cognos Analytics 11.0 and 11.1 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or cause the web server to make HTTP requests to arbitrary domains. IBM X-Force ID: 147369.
| null | null | null | null | null | null |
CVE-2019-13543
|
2019-11-08 20:15:00
|
2019-11-08 20:15:00
| 5
| 798
|
Use of Hard-coded Credentials
|
Medtronic Valleylab Exchange Client version 3.4 and below, Valleylab FT10 Energy Platform (VLFT10GEN) software version 4.0.0 and below, and Valleylab FX8 Energy Platform (VLFX8GEN) software version 1.1.0 and below use multiple sets of hard-coded credentials. If discovered, they can be used to read files on the device.
| null | null | null | null | null | null |
CVE-2019-13539
|
2019-11-08 20:15:00
|
2019-11-08 20:15:00
| 7.2
| 20
|
Improper Input Validation
|
Medtronic Valleylab Exchange Client version 3.4 and below, Valleylab FT10 Energy Platform (VLFT10GEN) software version 4.0.0 and below, and Valleylab FX8 Energy Platform (VLFX8GEN) software version 1.1.0 and below use the descrypt algorithm for OS password hashing. While interactive, network-based logons are disabled, and attackers can use the other vulnerabilities within this report to obtain local shell access and access these hashes.
| null | null | null | null | null | null |
CVE-2019-13535
|
2019-11-08 20:15:00
|
2019-11-08 20:15:00
| 2.1
| 200
|
Information Exposure
|
In Medtronic Valleylab FT10 Energy Platform (VLFT10GEN) version 2.1.0 and lower and version 2.0.3 and lower, and Valleylab LS10 Energy Platform (VLLS10GEN?not available in the United States) version 1.20.2 and lower, the RFID security mechanism does not apply read protection, allowing for full read access of the RFID security mechanism data.
| null | null | null | null | null | null |
CVE-2019-13531
|
2019-11-08 20:15:00
|
2019-11-08 20:15:00
| 2.1
| 287
|
Improper Authentication
|
In Medtronic Valleylab FT10 Energy Platform (VLFT10GEN) version 2.1.0 and lower and version 2.0.3 and lower, and Valleylab LS10 Energy Platform (VLLS10GEN?not available in the United States) version 1.20.2 and lower, the RFID security mechanism used for authentication between the FT10/LS10 Energy Platform and instruments can be bypassed, allowing for inauthentic instruments to connect to the generator.
| null | null | null | null | null | null |
CVE-2019-3426
|
2019-11-08 19:15:00
|
2019-11-08 19:15:00
| 7.5
| 20
|
Improper Input Validation
|
The 9000EV5.0R1B12 version, and all earlier versions of ZTE product ZXUPN-9000E are impacted by the input validation vulnerability. An attacker could exploit this vulnerability for unauthorized operations.
| null | null | null | null | null | null |
CVE-2019-3425
|
2019-11-08 19:15:00
|
2019-11-08 19:15:00
| 7.5
| 276
|
Incorrect Default Permissions
|
The 9000EV5.0R1B12 version, and all earlier versions of ZTE product ZXUPN-9000E are impacted by vulnerability of permission and access control. An attacker could exploit this vulnerability to directly reset or change passwords of other accounts.
| null | null | null | null | null | null |
CVE-2019-12410
|
2019-11-08 19:15:00
|
2019-11-08 19:15:00
| 5
| 476
|
NULL Pointer Dereference
|
While investigating UBSAN errors in https://github.com/apache/arrow/pull/5365 it was discovered Apache Arrow versions 0.12.0 to 0.14.1, left memory Array data uninitialized when reading RLE null data from parquet. This affected the C++, Python, Ruby and R implementations. The uninitialized memory could potentially be shared if are transmitted over the wire (for instance with Flight) or persisted in the streaming IPC and file formats.
| null | null | null | null | null | null |
CVE-2019-12408
|
2019-11-08 19:15:00
|
2019-11-08 19:15:00
| 5
| 476
|
NULL Pointer Dereference
|
It was discovered that the C++ implementation (which underlies the R, Python and Ruby implementations) of Apache Arrow 0.14.0 to 0.14.1 had a uninitialized memory bug when building arrays with null values in some cases. This can lead to uninitialized memory being unintentionally shared if Arrow Arrays are transmitted over the wire (for instance with Flight) or persisted in the streaming IPC and file formats.
| null | null | null | null | null | null |
CVE-2019-18623
|
2019-11-08 18:51:00
|
2019-11-08 18:15:00
| 7.5
| 269
|
Improper Privilege Management
|
Escalation of privileges in EnergyCAP 7 through 7.5.6 allows an attacker to access data. If an unauthenticated user clicks on a link on the public dashboard, the resource opens in EnergyCAP with access rights matching the user who created the dashboard.
| null | null | null | null | null | null |
CVE-2019-17661
|
2019-11-08 18:51:00
|
2019-11-08 18:15:00
| 9
| 74
|
Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
A CSV injection in the codepress-admin-columns (aka Admin Columns) plugin 3.4.6 for WordPress allows malicious users to gain remote control of other computers. By choosing formula code as his first or last name, an attacker can create a user with a name that contains malicious code. Other users might download this data as a CSV file and corrupt their PC by opening it in a tool such as Microsoft Excel. The attacker could gain remote access to the user's PC.
| null | null | null | null | null | null |
CVE-2019-17327
|
2019-11-08 18:51:00
|
2019-11-08 18:15:00
| 6.5
| 22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
JEUS 7 Fix#0~5 and JEUS 8Fix#0~1 versions contains a directory traversal vulnerability caused by improper input parameter check when uploading installation file in administration web page. That leads remote attacker to execute arbitrary code via uploaded file.
| null | null | null | null | null | null |
CVE-2019-13557
|
2019-11-08 18:51:00
|
2019-11-08 18:15:00
| 5
| 200
|
Information Exposure
|
In Tasy EMR, Tasy WebPortal Versions 3.02.1757 and prior, there is an information exposure vulnerability which may allow a remote attacker to access system and configuration information.
| null | null | null | null | null | null |
CVE-2019-16210
|
2019-11-08 18:39:00
|
2019-11-08 18:15:00
| 2.1
| 532
|
Inclusion of Sensitive Information in Log Files
|
Brocade SANnav versions before v2.0, logs plain text database connection password while triggering support save.
| null | null | null | null | null | null |
CVE-2019-16209
|
2019-11-08 18:39:00
|
2019-11-08 18:15:00
| 5.8
| 295
|
Improper Certificate Validation
|
A vulnerability, in The ReportsTrustManager class of Brocade SANnav versions before v2.0, could allow an attacker to perform a man-in-the-middle attack against Secure Sockets Layer(SSL)connections.
| null | null | null | null | null | null |
CVE-2019-16208
|
2019-11-08 18:39:00
|
2019-11-08 18:15:00
| 5
| 327
|
Use of a Broken or Risky Cryptographic Algorithm
|
Password-based encryption (PBE) algorithm, of Brocade SANnav versions before v2.0, has a weakness in generating cryptographic keys that may allow an attacker to decrypt passwords used with several services (Radius, TACAS, etc.).
| null | null | null | null | null | null |
CVE-2019-16207
|
2019-11-08 18:39:00
|
2019-11-08 18:15:00
| 4.6
| 798
|
Use of Hard-coded Credentials
|
Brocade SANnav versions before v2.0 use a hard-coded password, which could allow local authenticated attackers to access a back-end database and gain privileges.
| null | null | null | null | null | null |
CVE-2019-16206
|
2019-11-08 18:39:00
|
2019-11-08 18:15:00
| 2.1
| 532
|
Inclusion of Sensitive Information in Log Files
|
The authentication mechanism, in Brocade SANnav versions before v2.0, logs plaintext account credentials at the ?trace? and the 'debug' logging level; which could allow a local authenticated attacker to access sensitive information.
| null | null | null | null | null | null |
CVE-2019-16205
|
2019-11-08 18:38:00
|
2019-11-08 18:15:00
| 4.3
| 330
|
Use of Insufficiently Random Values
|
A vulnerability, in Brocade SANnav versions before v2.0, could allow remote attackers to brute-force a valid session ID. The vulnerability is due to an insufficiently random session ID for several post-authentication actions in the SANnav portal.
| null | null | null | null | null | null |
CVE-2013-1889
|
2019-11-08 16:15:00
|
2019-11-08 16:15:00
| 5
| 20
|
Improper Input Validation
|
mod_ruid2 before 0.9.8 improperly handles file descriptors which allows remote attackers to bypass security using a CGI script to break out of the chroot.
| null | null | null | null | null | null |
CVE-2019-3866
|
2019-11-08 15:22:00
|
2019-11-08 15:15:00
| 2.1
| 532
|
Inclusion of Sensitive Information in Log Files
|
An information-exposure vulnerability was discovered where openstack-mistral's undercloud log files containing clear-text information were made world readable. A malicious system user could exploit this flaw to access sensitive user information.
| null | null | null | null | null | null |
CVE-2019-14860
|
2019-11-08 15:22:00
|
2019-11-08 15:15:00
| 4.3
| 20
|
Improper Input Validation
|
It was found that the Syndesis configuration for Cross-Origin Resource Sharing was set to allow all origins. An attacker could use this lack of protection to conduct phishing attacks and further access unauthorized information.
| null | null | null | null | null | null |
CVE-2019-14824
|
2019-11-08 15:22:00
|
2019-11-08 15:15:00
| 3.5
| 416
|
Use After Free
|
A flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'search' permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as password hashes.
| null | null | null | null | null | null |
CVE-2019-10222
|
2019-11-08 15:22:00
|
2019-11-08 15:15:00
| 5
| 400
|
Uncontrolled Resource Consumption
|
A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients.
| null | null | null | null | null | null |
CVE-2019-10219
|
2019-11-08 15:22:00
|
2019-11-08 15:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.
| null | null | null | null | null | null |
CVE-2013-1820
|
2019-11-08 15:22:00
|
2019-11-08 15:15:00
| 4.7
| 20
|
Improper Input Validation
|
tuned before 2.x allows local users to kill running processes due to insecure permissions with tuned's ktune service.
| null | null | null | null | null | null |
CVE-2019-15005
|
2019-11-08 04:15:00
|
2019-11-08 04:15:00
| 4
| 862
|
Missing Authorization
|
The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2.
| null | null | null | null | null | null |
CVE-2019-18835
|
2019-11-08 00:15:00
|
2019-11-08 00:15:00
| 7.5
| 347
|
Improper Verification of Cryptographic Signature
|
Matrix Synapse before 1.5.0 mishandles signature checking on some federation APIs. Events sent over /send_join, /send_leave, and /invite may not be correctly signed, or may not come from the expected servers.
| null | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.