Unnamed: 0
stringlengths 13
16
| mod_date
stringdate 2008-01-10 05:00:00
2019-11-21 15:15:00
| pub_date
stringdate 1999-01-01 05:00:00
2019-11-21 15:15:00
| cvss
float64 0
10
| cwe_code
int64 1
1.19k
| cwe_name
stringclasses 170
values | summary
stringlengths 23
3.93k
| access_authentication
stringclasses 3
values | access_complexity
stringclasses 3
values | access_vector
stringclasses 3
values | impact_availability
stringclasses 3
values | impact_confidentiality
stringclasses 3
values | impact_integrity
stringclasses 3
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2019-8155
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 5
| 200
|
Information Exposure
|
Magento prior to 1.9.4.3 and prior to 1.14.4.3 included a user's CSRF token in the URL of a GET request. This could be exploited by an attacker with access to network traffic to perform unauthorized actions.
| null | null | null | null | null | null |
CVE-2019-8154
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 6.5
| 20
|
Improper Input Validation
|
A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with privileges to modify product catalogs can trigger PHP file inclusion through a crafted XML file that specifies product design update.
| null | null | null | null | null | null |
CVE-2019-8153
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
A mitigation bypass to prevent cross-site scripting (XSS) exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. Successful exploitation of this vulnerability would result in an attacker being able to bypass the `escapeURL()` function and execute a malicious XSS payload.
| null | null | null | null | null | null |
CVE-2019-8152
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
A stored cross-site scripting (XSS) vulnerability exists in in Magento 1 prior to 1.9.4.3 and 1.14.4.3, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with access to the wysiwyg editor can abuse the blockDirective() function and inject malicious javascript in the cache of the admin dashboard.
| null | null | null | null | null | null |
CVE-2019-8151
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 6.5
| 918
|
Server-Side Request Forgery (SSRF)
|
A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with admin privileges to manipulate shippment settings can execute arbitrary code through server-side request forgery due to unsafe handling of a carrier gateway.
| null | null | null | null | null | null |
CVE-2019-8150
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 6.5
| 20
|
Improper Input Validation
|
A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with privileges to manipulate layouts and images can insert a malicious payload into the page layout.
| null | null | null | null | null | null |
CVE-2019-8149
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 7.5
| 384
|
Session Fixation
|
Insecure authentication and session management vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An unauthenticated user can append arbitrary session id that will not be invalidated by subsequent authentication.
| null | null | null | null | null | null |
CVE-2019-8148
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
A stored cross-site scripting (XSS) vulnerability exists in Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated admin user can inject arbitrary JavaScript code when creating a content page via page builder.
| null | null | null | null | null | null |
CVE-2019-8144
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 7.5
| 20
|
Improper Input Validation
|
A remote code execution vulnerability exists in Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An unauthenticated user can insert a malicious payload through PageBuilder template methods.
| null | null | null | null | null | null |
CVE-2019-8141
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 6.5
| 502
|
Deserialization of Untrusted Data
|
A remote code execution vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. An authenticated user with administrative privileges (system level import) can execute arbitrary code through a Phar deserialization vulnerability in the import functionality.
| null | null | null | null | null | null |
CVE-2019-8140
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 4
| 434
|
Unrestricted Upload of File with Dangerous Type
|
An unrestricted file upload vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated admin user can manipulate the Synchronization feature in the Media File Storage of the database to transform uploaded JPEG file into a PHP file.
| null | null | null | null | null | null |
CVE-2019-8139
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
A stored cross-site scripting (XSS) vulnerability exists in Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary Javascript code into the dynamic block when invoking page builder on a product.
| null | null | null | null | null | null |
CVE-2019-8138
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
A stored cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can execute arbitrary JavaScript code by providing arbitrary API endpoint that will not be chcecked by sale pickup event.
| null | null | null | null | null | null |
CVE-2019-8137
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 6.5
| 20
|
Improper Input Validation
|
A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with privileges to manipulate CMS section of the website can trigger remote code execution via custom layout update.
| null | null | null | null | null | null |
CVE-2019-8135
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 7.5
| 74
|
Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. Dependency injection through Symphony framework allows service identifiers to be derived from user controlled data, which can lead to remote code execution.
| null | null | null | null | null | null |
CVE-2019-8134
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 6.5
| 89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
A SQL injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. A user with marketing privileges can execute arbitrary SQL queries in the database when accessing email template variables.
| null | null | null | null | null | null |
CVE-2019-8133
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 4
| 20
|
Improper Input Validation
|
A security bypass vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. A user with privileges to generate sitemaps can bypass configuration that restricts directory access. The bypass allows overwrite of a subset of configuration files which can lead to denial of service.
| null | null | null | null | null | null |
CVE-2019-8131
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
A stored cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary JavaScript code into code field of an inventory source.
| null | null | null | null | null | null |
CVE-2019-8130
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 6.5
| 89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
A SQL injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. A user with store manipulation privileges can execute arbitrary SQL queries by getting access to the database connection through group instance in email templates.
| null | null | null | null | null | null |
CVE-2019-8129
|
2019-11-06 00:44:00
|
2019-11-06 00:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
A stored cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can exploit it by injecting an embedded expression into a translation.
| null | null | null | null | null | null |
CVE-2019-8127
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 6.5
| 89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
A SQL injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with privileges to an account with Newsletter Template editing permission could exfiltrate the Admin login data, and reset their password, effectively performing a privilege escalation.
| null | null | null | null | null | null |
CVE-2019-8126
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 4
| 776
|
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
|
An XML entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated admin user can craft document type definition for an XML representing XML layout. The crafted document type definition and XML layout allow processing of external entities which can lead to information disclosure.
| null | null | null | null | null | null |
CVE-2019-8125
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 6.5
| 20
|
Improper Input Validation
|
A remote code execution vulnerability exists in Magento 1 prior to 1.9.x and 1.14.x. An authenticated admin user can modify configuration parameters via crafted support configuration. The modification can lead to remote code execution.
| null | null | null | null | null | null |
CVE-2019-8124
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 5
| 345
|
Insufficient Verification of Data Authenticity
|
An insufficient logging and monitoring vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. Failure to track admin actions related to design configuration could lead to repudiation attacks.
| null | null | null | null | null | null |
CVE-2019-8122
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 6.5
| 20
|
Improper Input Validation
|
A remote code execution vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. An authenticated user with privileges to create products can craft custom layout update and use import product functionality to enable remote code execution.
| null | null | null | null | null | null |
CVE-2019-8118
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 5
| 312
|
Cleartext Storage of Sensitive Information
|
Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 uses weak cryptographic function to store the failed login attempts for customer accounts.
| null | null | null | null | null | null |
CVE-2019-8116
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 5
| 287
|
Improper Authentication
|
Insecure authentication and session management vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An unauthenticated user can leverage a guest session id value following a successful login to gain access to customer account index page.
| null | null | null | null | null | null |
CVE-2019-8114
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 6.5
| 434
|
Unrestricted Upload of File with Dangerous Type
|
A remote code execution vulnerability exists in Magento 1 prior to 1.9.4.3 and 1.14.4.3, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with admin privileges to import features can execute arbitrary code via crafted configuration archive file upload.
| null | null | null | null | null | null |
CVE-2019-8113
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 5
| 338
|
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
|
Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1 uses cryptographically weak random number generator to brute-force the confirmation code for customer registration.
| null | null | null | null | null | null |
CVE-2019-8112
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 5
| 345
|
Insufficient Verification of Data Authenticity
|
A security bypass vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An unauthenticated user can bypass the email confirmation mechanism via GET request that captures relevant account data obtained from the POST response related to new user creation.
| null | null | null | null | null | null |
CVE-2019-8111
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 6.5
| 20
|
Improper Input Validation
|
A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can leverage plugin functionality related to email templates to manipulate the interceptor class in a way that allows an attacker to execute arbitrary code.
| null | null | null | null | null | null |
CVE-2019-8110
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 6.5
| 20
|
Improper Input Validation
|
A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can leverage email templates hierarchy to manipulate the interceptor class in a way that allows an attacker to execute arbitrary code.
| null | null | null | null | null | null |
CVE-2019-8109
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 6
| 352
|
Cross-Site Request Forgery (CSRF)
|
A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can craft a malicious CSRF payload that can result in arbitrary command execution.
| null | null | null | null | null | null |
CVE-2019-8108
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 4
| 287
|
Improper Authentication
|
Insecure authentication and session management vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can manipulate session validation setting for a storefront that leads to insecure authentication and session management.
| null | null | null | null | null | null |
CVE-2019-8107
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 5.5
| 20
|
Improper Input Validation
|
An arbitrary file deletion vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with export data transfer privileges can craft a request to perform arbitrary file deletion.
| null | null | null | null | null | null |
CVE-2019-8093
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 6.5
| 434
|
Unrestricted Upload of File with Dangerous Type
|
An arbitrary file access vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can leverage file upload controller for downloadable products to read/delete an arbitary files.
| null | null | null | null | null | null |
CVE-2019-8092
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
A reflected cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary JavaScript code via email template preview.
| null | null | null | null | null | null |
CVE-2019-8091
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 6.5
| 20
|
Improper Input Validation
|
A remote code execution vulnerability exists in Magento 1 prior to 1.9.4.3 and 1.14.4.3. An authenticated admin user with privileges to access product attributes can leverage layout updates to trigger remote code execution.
| null | null | null | null | null | null |
CVE-2019-5068
|
2019-11-06 00:44:00
|
2019-11-05 22:15:00
| 3.6
| 732
|
Incorrect Permission Assignment for Critical Resource
|
An exploitable shared memory permissions vulnerability exists in the functionality of X11 Mesa 3D Graphics Library 19.1.2. An attacker can access the shared memory without any specific permissions to trigger this vulnerability.
| null | null | null | null | null | null |
CVE-2018-4002
|
2019-11-06 00:44:00
|
2019-10-31 21:15:00
| 7.8
| 674
|
Uncontrolled Recursion
|
An exploitable denial-of-service vulnerability exists in the mdnscap binary of the CUJO Smart Firewall running firmware 7003. When parsing labels in mDNS packets, the firewall unsafely handles label compression pointers, leading to an uncontrolled recursion that eventually exhausts the stack, crashing the mdnscap process. An unauthenticated attacker can send an mDNS message to trigger this vulnerability.
|
NONE
|
LOW
|
NETWORK
|
COMPLETE
|
NONE
|
NONE
|
CVE-2016-4983
|
2019-11-06 00:44:00
|
2019-11-05 22:15:00
| 2.1
| 732
|
Incorrect Permission Assignment for Critical Resource
|
A postinstall script in the dovecot rpm allows local users to read the contents of newly created SSL/TLS key files.
| null | null | null | null | null | null |
CVE-2013-5123
|
2019-11-06 00:44:00
|
2019-11-05 22:15:00
| 4.3
| 287
|
Improper Authentication
|
The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.
| null | null | null | null | null | null |
CVE-2011-1460
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 7.5
| 704
|
Incorrect Type Conversion or Cast
|
WebKit in Google Chrome before Blink M11 contains a bad cast to RenderBlock when anonymous blocks are renderblocks.
| null | null | null | null | null | null |
CVE-2011-1459
|
2019-11-06 00:44:00
|
2019-11-05 23:15:00
| 4.3
| 400
|
Uncontrolled Resource Consumption
|
The WebKit::WebPluginContainerImpl::handleEvent function in Google Chrome before Blink M11 allows an attacker to cause a denial of service (crash) via the htmlpluginelement.cpp plugin.
| null | null | null | null | null | null |
CVE-2018-4031
|
2019-11-06 00:29:00
|
2019-10-31 21:15:00
| 10
| 94
|
Improper Control of Generation of Code ('Code Injection')
|
An exploitable vulnerability exists in the safe browsing function of the CUJO Smart Firewall, version 7003. The flaw lies in the way the safe browsing function parses HTTP requests. The server hostname is extracted from captured HTTP/HTTPS requests and inserted as part of a Lua statement without prior sanitization, which results in arbitrary Lua script execution in the kernel. An attacker could send an HTTP request to exploit this vulnerability.
|
NONE
|
LOW
|
NETWORK
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-13547
|
2019-11-06 00:11:00
|
2019-10-31 21:15:00
| 10
| 862
|
Missing Authorization
|
Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. There is an unsecured function that allows anyone who can access the IP address to use the function without authentication.
|
NONE
|
LOW
|
NETWORK
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-13551
|
2019-11-06 00:04:00
|
2019-10-31 21:15:00
| 10
| 22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. Path traversal vulnerabilities are caused by a lack of proper validation of a user-supplied path prior to use in file operations. An attacker can leverage these vulnerabilities to remotely execute code while posing as an administrator.
|
NONE
|
LOW
|
NETWORK
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-5043
|
2019-11-05 23:40:00
|
2019-10-31 21:15:00
| 7.8
| 400
|
Uncontrolled Resource Consumption
|
An exploitable denial-of-service vulnerability exists in the Weave daemon of the Nest Cam IQ Indoor, version 4620002. A set of TCP connections can cause unrestricted resource allocation, resulting in a denial of service. An attacker can connect multiple times to trigger this vulnerability.
|
NONE
|
LOW
|
NETWORK
|
COMPLETE
|
NONE
|
NONE
|
CVE-2019-16295
|
2019-11-05 23:36:00
|
2019-10-31 21:15:00
| 1.9
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Stored XSS in filemanager2.php in CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.885 exists via the cmd_arg parameter. This can be exploited by a local attacker who supplies a crafted filename within a directory visited by the victim.
|
NONE
|
MEDIUM
|
LOCAL
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-18226
|
2019-11-05 23:23:00
|
2019-10-31 22:15:00
| 7.5
| 294
|
Authentication Bypass by Capture-replay
|
Honeywell equIP series and Performance series IP cameras and recorders, A vulnerability exists in the affected products where IP cameras and recorders have a potential replay attack vulnerability as a weak authentication method is retained for compatibility with legacy products.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-18228
|
2019-11-05 23:20:00
|
2019-10-31 22:15:00
| 5
| 20
|
Improper Input Validation
|
Honeywell equIP series IP cameras Multiple equIP Series Cameras, A vulnerability exists in the affected products where a specially crafted HTTP packet request could result in a denial of service.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-18229
|
2019-11-05 23:16:00
|
2019-10-31 22:15:00
| 4
| 89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. Lack of sanitization of user-supplied input cause SQL injection vulnerabilities. An attacker can leverage these vulnerabilities to disclose information.
|
SINGLE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-6657
|
2019-11-05 22:12:00
|
2019-11-01 15:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
On BIG-IP 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.2-11.6.5.1, a reflected cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Traffic Management User Interface (TMUI), also known as the BIG-IP Configuration utility.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-6658
|
2019-11-05 22:02:00
|
2019-11-01 15:15:00
| 4
| 89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
On BIG-IP AFM 15.0.0-15.0.1, 14.0.0-14.1.2, 13.1.0-13.1.3.1, and 12.1.0-12.1.5, a vulnerability in the AFM configuration utility may allow any authenticated BIG-IP user to run an SQL injection attack.
|
SINGLE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2019-13496
|
2019-11-05 21:51:00
|
2019-11-04 17:15:00
| 4.3
| 354
|
Improper Validation of Integrity Check Value
|
One Identity Cloud Access Manager before 8.1.4 Hotfix 1 allows OTP bypass via vectors involving a man in the middle, the One Identity Defender product, and replacing a failed SAML response with a successful SAML response.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2010-3660
|
2019-11-05 21:43:00
|
2019-11-01 18:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows XSS on the backend.
|
SINGLE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-13497
|
2019-11-05 21:36:00
|
2019-11-04 18:15:00
| 4.3
| 352
|
Cross-Site Request Forgery (CSRF)
|
One Identity Cloud Access Manager before 8.1.4 Hotfix 1 allows CSRF for logout requests.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-17551
|
2019-11-05 21:31:00
|
2019-10-31 03:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
In Apak Wholesale Floorplanning Finance 6.31.8.3 and 6.31.8.5, an attacker can send an authenticated POST request with a malicious payload to /WFS/agreementView.faces allowing a stored XSS via the mainForm:loanNotesnotes:0:rich_text_editor_note_text parameter in the Notes section. Although versions 6.31.8.3 and 6.31.8.5 are confirmed to be affected, all versions with the vulnerable WYSIWYG editor in the Notes section are likely affected.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2013-0186
|
2019-11-05 21:30:00
|
2019-11-01 19:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Multiple cross-site scripting (XSS) vulnerabilities in ManageIQ EVM allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-9192
|
2019-11-05 21:15:00
|
2019-02-26 18:29:00
| 5
| 399
|
Resource Management Errors
|
** DISPUTED ** In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\1\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2019-6142
|
2019-11-05 21:15:00
|
2019-11-05 21:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
It has been reported that XSS is possible in Forcepoint Email Security, versions 8.5 and 8.5.3. It is strongly recommended that you apply the relevant hotfix in order to remediate this issue.
| null | null | null | null | null | null |
CVE-2019-5089
|
2019-11-05 21:15:00
|
2019-11-05 21:15:00
| 6.8
| 787
|
Out-of-bounds Write
|
An exploitable memory corruption vulnerability exists in Investintech Able2Extract Professional 4.0.7 x64. A specially crafted JPEG file can cause an out-of-bounds memory write, allowing an attacker to execute arbitrary code on the victim machine. An attacker could exploit a vulnerability by providing the user with a specially crafted JPEG file.
| null | null | null | null | null | null |
CVE-2019-5088
|
2019-11-05 21:15:00
|
2019-11-05 21:15:00
| 6.8
| 787
|
Out-of-bounds Write
|
An exploitable memory corruption vulnerability exists in Investintech Able2Extract Professional 14.0.7 x64. A specially crafted BMP file can cause an out-of-bounds memory write, allowing a potential attacker to execute arbitrary code on the victim machine. Can trigger this vulnerability by sending the user a specially crafted BMP file.
| null | null | null | null | null | null |
CVE-2019-17624
|
2019-11-05 21:15:00
|
2019-10-16 11:15:00
| 4.6
| 787
|
Out-of-bounds Write
|
"" In X.Org X Server 1.20.4, there is a stack-based buffer overflow in the function XQueryKeymap. For example, by sending ct.c_char 1000 times, an attacker can cause a denial of service (application crash) or possibly have unspecified other impact. Note: It is disputed if the X.Org X Server is involved or if there is a stack overflow.
|
NONE
|
LOW
|
LOCAL
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-16284
|
2019-11-05 21:15:00
|
2019-11-05 21:15:00
| 9
| 20
|
Improper Input Validation
|
A potential security vulnerability has been identified in multiple HP products and versions which involves possible execution of arbitrary code during boot services that can result in elevation of privilege. The EFI_BOOT_SERVICES structure might be overwritten by an attacker to execute arbitrary SMM (System Management Mode) code. A list of affected products and versions are available in https://support.hp.com/rs-en/document/c06456250.
| null | null | null | null | null | null |
CVE-2018-20796
|
2019-11-05 21:15:00
|
2019-02-26 02:29:00
| 5
| 674
|
Uncontrolled Recursion
|
In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\227|)(\\1\\1|t1|\\\2537)+' in grep.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2018-16513
|
2019-11-05 21:15:00
|
2018-09-05 13:29:00
| 6.8
| 704
|
Incorrect Type Conversion or Cast
|
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2018-15911
|
2019-11-05 21:15:00
|
2018-08-28 04:29:00
| 6.8
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2018-15910
|
2019-11-05 21:15:00
|
2018-08-27 17:29:00
| 6.8
| 704
|
Incorrect Type Conversion or Cast
|
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.
|
NONE
|
MEDIUM
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2011-1135
|
2019-11-05 21:15:00
|
2019-11-05 21:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Cross-Site Scripting (XSS) in Xinha, as included in the Serendipity package before 1.5.5, allows remote attackers to execute arbitrary code in plugins/ExtendedFileManager/manager.php and plugins/ImageManager/manager.php.
| null | null | null | null | null | null |
CVE-2011-1134
|
2019-11-05 21:15:00
|
2019-11-05 21:15:00
| 7.5
| 434
|
Unrestricted Upload of File with Dangerous Type
|
Cross-Site Scripting (XSS) in Xinha, as included in the Serendipity package before 1.5.5, allows remote attackers to execute arbitrary code in the image manager.
| null | null | null | null | null | null |
CVE-2011-1133
|
2019-11-05 21:15:00
|
2019-11-05 21:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Cross-Site Scripting (XSS) in Xinha, as included in the Serendipity package before 1.5.5, allows remote attackers to execute arbitrary code via plugins/ExtendedFileManager/backend.php.
| null | null | null | null | null | null |
CVE-2019-1982
|
2019-11-05 21:14:00
|
2019-11-05 20:15:00
| 5
| 276
|
Incorrect Default Permissions
|
A vulnerability in the HTTP traffic filtering component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper handling of HTTP requests, including those communicated over a secure HTTPS connection, that contain maliciously crafted headers. An attacker could exploit this vulnerability by sending malicious requests to an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems, allowing attackers to deliver malicious content that would otherwise be blocked.
| null | null | null | null | null | null |
CVE-2019-1981
|
2019-11-05 21:14:00
|
2019-11-05 20:15:00
| 5
| 287
|
Improper Authentication
|
A vulnerability in the normalization functionality of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to insufficient normalization of a text-based payload. An attacker could exploit this vulnerability by sending traffic that contains specifically obfuscated payloads through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious payloads to protected systems that would otherwise be blocked.
| null | null | null | null | null | null |
CVE-2019-1980
|
2019-11-05 21:14:00
|
2019-11-05 20:15:00
| 5
| 287
|
Improper Authentication
|
A vulnerability in the protocol detection component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper detection of the initial use of a protocol on a nonstandard port. An attacker could exploit this vulnerability by sending traffic on a nonstandard port for the protocol in use through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems that would otherwise be blocked. Once the initial protocol flow on the nonstandard port is detected, future flows on the nonstandard port will be successfully detected and handled as configured by the applied policy.
| null | null | null | null | null | null |
CVE-2019-1978
|
2019-11-05 21:14:00
|
2019-11-05 20:15:00
| 5
| 287
|
Improper Authentication
|
A vulnerability in the stream reassembly component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper reassembly of traffic streams. An attacker could exploit this vulnerability by sending crafted streams through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems that would otherwise be blocked.
| null | null | null | null | null | null |
CVE-2019-18780
|
2019-11-05 21:14:00
|
2019-11-05 20:15:00
| 10
| 78
|
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
|
An arbitrary command injection vulnerability in the Cluster Server component of Veritas InfoScale allows an unauthenticated remote attacker to execute arbitrary commands as root or administrator. These Veritas products are affected: Access 7.4.2 and earlier, Access Appliance 7.4.2 and earlier, Flex Appliance 1.2 and earlier, InfoScale 7.3.1 and earlier, InfoScale between 7.4.0 and 7.4.1, Veritas Cluster Server (VCS) 6.2.1 and earlier on Linux/UNIX, Veritas Cluster Server (VCS) 6.1 and earlier on Windows, Storage Foundation HA (SFHA) 6.2.1 and earlier on Linux/UNIX, and Storage Foundation HA (SFHA) 6.1 and earlier on Windows.
| null | null | null | null | null | null |
CVE-2019-1877
|
2019-11-05 21:14:00
|
2019-11-05 20:15:00
| 4.3
| 200
|
Information Exposure
|
A vulnerability in the HTTP API of Cisco Enterprise Chat and Email could allow an unauthenticated, remote attacker to download files attached through chat sessions. The vulnerability is due to insufficient authentication mechanisms on the file download function of the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to download files that other users attach through the chat feature. This vulnerability affects versions prior to 12.0(1)ES1.
| null | null | null | null | null | null |
CVE-2019-18631
|
2019-11-05 21:14:00
|
2019-11-05 16:15:00
| 5.1
| 502
|
Deserialization of Untrusted Data
|
The Windows component of Centrify Authentication and Privilege Elevation Services 3.4.0, 3.4.1, 3.4.2, 3.4.3, 3.5.0, 3.5.1 (18.8), 3.5.2 (18.11), and 3.6.0 (19.6) does not properly handle an unspecified exception during use of partially trusted assemblies to serialize input data, which allows attackers to execute arbitrary code inside the Centrify process via (1) a crafted application that makes a pipe connection to the process and sends malicious serialized data or (2) a crafted Microsoft Management Console snap-in control file.
| null | null | null | null | null | null |
CVE-2019-1789
|
2019-11-05 21:14:00
|
2019-11-05 19:15:00
| 5
| 125
|
Out-of-bounds Read
|
ClamAV versions prior to 0.101.2 are susceptible to a denial of service (DoS) vulnerability. An out-of-bounds heap read condition may occur when scanning PE files. An example is Windows EXE and DLL files that have been packed using Aspack as a result of inadequate bound-checking.
| null | null | null | null | null | null |
CVE-2019-1734
|
2019-11-05 21:14:00
|
2019-11-05 20:15:00
| 2.1
| 200
|
Information Exposure
|
A vulnerability in the implementation of a CLI diagnostic command in Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to view sensitive system files that should be restricted. The attacker could use this information to conduct additional reconnaissance attacks. The vulnerability is due to incomplete role-based access control (RBAC) verification. An attacker could exploit this vulnerability by authenticating to the device and issuing a specific CLI diagnostic command with crafted user-input parameters. An exploit could allow the attacker to perform an arbitrary read of a file on the device, and the file may contain sensitive information. The attacker needs valid device credentials to exploit this vulnerability.
| null | null | null | null | null | null |
CVE-2019-17211
|
2019-11-05 21:14:00
|
2019-11-05 16:15:00
| 10
| 190
|
Integer Overflow or Wraparound
|
An integer overflow was discovered in the CoAP library in Arm Mbed OS 5.14.0. The function sn_coap_builder_calc_needed_packet_data_size_2() is used to calculate the required memory for the CoAP message from the sn_coap_hdr_s data structure. Both returned_byte_count and src_coap_msg_ptr->payload_len are of type uint16_t. When added together, the result returned_byte_count can wrap around the maximum uint16_t value. As a result, insufficient buffer space is allocated for the corresponding CoAP message.
| null | null | null | null | null | null |
CVE-2019-17062
|
2019-11-05 21:14:00
|
2019-11-05 16:15:00
| 6.8
| 384
|
Session Fixation
|
An issue was discovered in OXID eShop 6.x before 6.0.6 and 6.1.x before 6.1.5, OXID eShop Enterprise Edition Version 5.2.x-5.3.x, OXID eShop Professional Edition Version 4.9.x-4.10.x and OXID eShop Community Edition Version: 4.9.x-4.10.x. By using a specially crafted URL, users with administrative rights could unintentionally grant unauthorized users access to the admin panel via session fixation.
| null | null | null | null | null | null |
CVE-2019-15966
|
2019-11-05 21:14:00
|
2019-11-05 19:15:00
| 6.8
| 20
|
Improper Input Validation
|
A vulnerability in the web application of Cisco TelePresence Advanced Media Gateway could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the lack of input validation in the web application. An attacker could exploit this vulnerability by sending a crafted authenticated HTTP request to the device. An exploit could allow the attacker to stop services on an affected device. The device may become inoperable and results in a denial of service (DoS) condition.
| null | null | null | null | null | null |
CVE-2019-12625
|
2019-11-05 21:14:00
|
2019-11-05 19:15:00
| 5
| 404
|
Improper Resource Shutdown or Release
|
ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.
| null | null | null | null | null | null |
CVE-2019-10084
|
2019-11-05 21:14:00
|
2019-11-05 20:15:00
| 4.6
| 306
|
Missing Authentication for Critical Function
|
In Apache Impala 2.7.0 to 3.2.0, an authenticated user with access to the IDs of active Impala queries or sessions can interact with those sessions or queries via a specially-constructed request and thereby potentially bypass authorization and audit mechanisms. Session and query IDs are unique and random, but have not been documented or consistently treated as sensitive secrets. Therefore they may be exposed in logs or interfaces. They were also not generated with a cryptographically secure random number generator, so are vulnerable to random number generator attacks that predict future IDs based on past IDs. Impala deployments with Apache Sentry or Apache Ranger authorization enabled may be vulnerable to privilege escalation if an authenticated attacker is able to hijack a session or query from another authenticated user with privileges not assigned to the attacker. Impala deployments with audit logging enabled may be vulnerable to incorrect audit logging as a user could undertake actions that were logged under the name of a different authenticated user. Constructing an attack requires a high degree of technical sophistication and access to the Impala system as an authenticated user.
| null | null | null | null | null | null |
CVE-2013-6275
|
2019-11-05 21:14:00
|
2019-11-05 19:15:00
| 4.3
| 352
|
Cross-Site Request Forgery (CSRF)
|
Multiple CSRF issues in Horde Groupware Webmail Edition 5.1.2 and earlier in basic.php.
| null | null | null | null | null | null |
CVE-2013-5661
|
2019-11-05 21:14:00
|
2019-11-05 19:15:00
| 2.6
| 290
|
Authentication Bypass by Spoofing
|
Cache Poisoning issue exists in DNS Response Rate Limiting.
| null | null | null | null | null | null |
CVE-2010-3673
|
2019-11-05 21:14:00
|
2019-11-05 20:15:00
| 5
| 200
|
Information Exposure
|
TYPO3 before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows information disclosure in the mail header of the HTML mailing API.
| null | null | null | null | null | null |
CVE-2010-3672
|
2019-11-05 21:14:00
|
2019-11-05 20:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
TYPO3 before 4.3.4 and 4.4.x before 4.4.1 allows XSS in the textarea view helper in an extbase extension.
| null | null | null | null | null | null |
CVE-2010-3671
|
2019-11-05 21:14:00
|
2019-11-05 20:15:00
| 9.4
| 384
|
Session Fixation
|
TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 is open to a session fixation attack which allows remote attackers to hijack a victim's session.
| null | null | null | null | null | null |
CVE-2010-3670
|
2019-11-05 21:14:00
|
2019-11-05 20:15:00
| 5.8
| 326
|
Inadequate Encryption Strength
|
TYPO3 before 4.3.4 and 4.4.x before 4.4.1 contains insecure randomness during generation of a hash with the "forgot password" function.
| null | null | null | null | null | null |
CVE-2010-2222
|
2019-11-05 21:14:00
|
2019-11-05 20:15:00
| 5
| 476
|
NULL Pointer Dereference
|
The _ger_parse_control function in Red Hat Directory Server 8 and the 389 Directory Server allows attackers to cause a denial of service (NULL pointer dereference) via a crafted search query.
| null | null | null | null | null | null |
CVE-2010-1678
|
2019-11-05 21:13:00
|
2019-10-29 21:15:00
| 5
| 20
|
Improper Input Validation
|
Mapserver 5.2, 5.4 and 5.6 before 5.6.5-2 improperly validates symbol index values during Mapfile parsing.
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
NONE
|
NONE
|
CVE-2016-10703
|
2019-11-05 21:09:00
|
2017-12-14 19:29:00
| 7.8
| 20
|
Improper Input Validation
|
A regular expression Denial of Service (DoS) vulnerability in the file lib/ecstatic.js of the ecstatic npm package, before version 2.0.0, allows a remote attacker to overload and crash a server by passing a maliciously crafted string.
|
NONE
|
LOW
|
NETWORK
|
COMPLETE
|
NONE
|
NONE
|
CVE-2009-5041
|
2019-11-05 20:58:00
|
2019-10-31 16:15:00
| 7.5
| 120
|
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
|
overkill has buffer overflow via long player names that can corrupt data on the server machine
|
NONE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-18189
|
2019-11-05 20:57:00
|
2019-10-28 20:15:00
| 10
| 22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
A directory traversal vulnerability in Trend Micro Apex One, OfficeScan (11.0, XG) and Worry-Free Business Security (9.5, 10.0) may allow an attacker to bypass authentication and log on to an affected product's management console as a root user. The vulnerability does not require authentication.
|
NONE
|
LOW
|
NETWORK
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-7619
|
2019-11-05 20:49:00
|
2019-10-30 14:15:00
| 5
| 327
|
Use of a Broken or Risky Cryptographic Algorithm
|
Elasticsearch versions 7.0.0-7.3.2 and 6.7.0-6.8.3 contain a username disclosure flaw was found in the API Key service. An unauthenticated attacker could send a specially crafted request and determine if a username exists in the Elasticsearch native realm.
|
NONE
|
LOW
|
NETWORK
|
NONE
|
PARTIAL
|
NONE
|
CVE-2010-2061
|
2019-11-05 20:41:00
|
2019-10-29 22:15:00
| 7.2
| 20
|
Improper Input Validation
|
rpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr, which can be created by an attacker before the daemon is started.
|
NONE
|
LOW
|
LOCAL
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2017-5331
|
2019-11-05 20:40:00
|
2019-11-04 21:15:00
| 4.6
| 190
|
Integer Overflow or Wraparound
|
Integer overflow in the check_offset function in b/wrestool/fileread.c in icoutils before 0.31.1 allows local users to cause a denial of service (process crash) and execute arbitrary code via a crafted executable.
|
NONE
|
LOW
|
LOCAL
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.