CVSS float64 1.9 10 ⌀ | CWE stringclasses 94
values | CISA_Due_Date stringclasses 212
values | CVE stringlengths 13 16 | Product stringlengths 2 179 | CVE_Published stringlengths 19 19 | Vendor stringclasses 177
values | References listlengths 1 170 | Vulnerable_Products listlengths 0 11.5k | Vulnerability_Name stringlengths 30 136 | CISA_Date_Added stringclasses 192
values | Description stringlengths 55 567 | Required_Action stringclasses 23
values | CVE_Modified stringlengths 19 19 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
4 | NVD-CWE-noinfo | 2022-06-13 | CVE-2019-0703 | Windows | 2019-04-09T00:29:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0703"
] | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*... | Microsoft Windows SMB Information Disclosure Vulnerability | 2022-05-23 | An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests, which could lead to information disclosure from the server. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
10 | CWE-416 | 2022-05-03 | CVE-2019-0708 | Remote Desktop Services | 2019-05-16T19:29:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708",
"https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf",
"https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf",
"https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf",
"https://cert-portal.sieme... | [
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64... | Microsoft Remote Desktop Services Remote Code Execution Vulnerability | 2021-11-03 | Microsoft Remote Desktop Services, formerly known as Terminal Service, contains an unspecified vulnerability that allows an unauthenticated attacker to connect to the target system using RDP and send specially crafted requests. Successful exploitation allows for remote code execution. The vulnerability is also known un... | Apply updates per vendor instructions. | 2021-06-03T18:15:00 |
7.6 | CWE-843 | 2022-08-15 | CVE-2019-0752 | Internet Explorer | 2019-04-09T21:29:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0752",
"https://www.zerodayinitiative.com/advisories/ZDI-19-359/",
"http://packetstormsecurity.com/files/153078/Microsoft-Internet-Explorer-Windows-10-1809-17763.316-Memory-Corruption.html"
] | [
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*"
] | Microsoft Internet Explorer Type Confusion Vulnerability | 2022-02-15 | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer | Apply updates per vendor instructions. | 2023-03-17T18:32:00 |
7.2 | NVD-CWE-noinfo | 2022-05-03 | CVE-2019-0797 | Win32k | 2019-04-09T03:29:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0797"
] | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*... | Microsoft Win32k Privilege Escalation Vulnerability | 2021-11-03 | Microsoft Win32k contains a privilege escalation vulnerability when the Win32k component fails to properly handle objects in memory. Successful exploitation allows an attacker to execute code in kernel mode. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
7.2 | NVD-CWE-noinfo | 2022-05-03 | CVE-2019-0803 | Win32k | 2019-04-09T21:29:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0803",
"http://packetstormsecurity.com/files/153034/Microsoft-Windows-Win32k-Privilege-Escalation.html"
] | [
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o... | Microsoft Win32k Privilege Escalation Vulnerability | 2021-11-03 | Microsoft Win32k contains an unspecified vulnerability due to it failing to properly handle objects in memory causing privilege escalation. Successful exploitation allows an attacker to run code in kernel mode. | Apply updates per vendor instructions. | 2023-03-20T16:19:00 |
7.2 | NVD-CWE-noinfo | 2022-05-03 | CVE-2019-0808 | Win32k | 2019-04-09T03:29:00 | Microsoft | [
"http://packetstormsecurity.com/files/157616/Microsoft-Windows-NtUserMNDragOver-Local-Privilege-Escalation.html",
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0808"
] | [
"cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"
] | Microsoft Win32k Privilege Escalation Vulnerability | 2021-11-03 | Microsoft Win32k contains a privilege escalation vulnerability due to the component failing to properly handle objects in memory. Successful exploitation allows an attacker to run code in kernel mode. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
7.2 | CWE-59 | 2022-04-05 | CVE-2019-0841 | Windows | 2019-04-09T21:29:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0841",
"https://www.exploit-db.com/exploits/46683/",
"http://packetstormsecurity.com/files/152463/Microsoft-Windows-AppX-Deployment-Service-Privilege-Escalation.html",
"https://www.zerodayinitiative.com/advisories/ZDI-19-360/",
"ht... | [
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1709:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1703:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft... | Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability | 2022-03-15 | A privilege escalation vulnerability exists when Windows AppXSVC improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. | Apply updates per vendor instructions. | 2023-03-20T18:09:00 |
7.2 | NVD-CWE-noinfo | 2022-05-03 | CVE-2019-0859 | Win32k | 2019-04-09T21:29:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0859"
] | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*... | Microsoft Win32k Privilege Escalation Vulnerability | 2021-11-03 | Microsoft Win32k fails to properly handle objects in memory causing privilege escalation. Successful exploitation allows an attacker to run code in kernel mode. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
7.2 | NVD-CWE-noinfo | 2022-05-03 | CVE-2019-0863 | Windows | 2019-05-16T19:29:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0863",
"http://packetstormsecurity.com/files/153008/Angry-Polar-Bear-2-Microsoft-Windows-Error-Reporting-Local-Privilege-Escalation.html"
] | [
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o... | Microsoft Windows Error Reporting (WER) Privilege Escalation Vulnerability | 2021-11-03 | Microsoft Windows Error Reporting (WER) contains a privilege escalation vulnerability due to the way it handles files, allowing for code execution in kernel mode. | Apply updates per vendor instructions. | 2023-03-20T18:12:00 |
4.6 | NVD-CWE-noinfo | 2022-06-13 | CVE-2019-0880 | Windows | 2019-07-15T19:15:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0880"
] | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*... | Microsoft Windows Privilege Escalation Vulnerability | 2022-05-23 | A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
9.3 | NVD-CWE-noinfo | 2022-04-15 | CVE-2019-0903 | Graphics Device Interface (GDI) | 2019-05-16T19:29:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0903"
] | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*... | Microsoft GDI Remote Code Execution Vulnerability | 2022-03-25 | A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
6.5 | NVD-CWE-noinfo | 2022-05-16 | CVE-2019-1003029 | Script Security Plugin | 2019-03-08T21:29:00 | Jenkins | [
"http://www.securityfocus.com/bid/107476",
"https://access.redhat.com/errata/RHSA-2019:0739",
"http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html",
"https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20%281%29"
] | [
"cpe:2.3:a:jenkins:script_security:1.0:*:*:*:*:jenkins:*:*",
"cpe:2.3:a:jenkins:script_security:1.0:-:*:*:*:jenkins:*:*",
"cpe:2.3:a:jenkins:script_security:1.0:beta1:*:*:*:jenkins:*:*",
"cpe:2.3:a:jenkins:script_security:1.0:beta2:*:*:*:jenkins:*:*",
"cpe:2.3:a:jenkins:script_security:1.0:beta3:*:*:*:jenki... | Jenkins Script Security Plugin Sandbox Bypass Vulnerability | 2022-04-25 | Jenkins Script Security Plugin contains a protection mechanism failure, allowing an attacker to bypass the sandbox. | Apply updates per vendor instructions. | 2023-10-25T18:16:00 |
6.5 | NVD-CWE-noinfo | 2022-04-15 | CVE-2019-1003030 | Matrix Project Plugin | 2019-03-08T21:29:00 | Jenkins | [
"http://www.securityfocus.com/bid/107476",
"https://access.redhat.com/errata/RHSA-2019:0739",
"http://packetstormsecurity.com/files/159603/Jenkins-2.63-Sandbox-Bypass.html",
"https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20%282%29"
] | [
"cpe:2.3:a:jenkins:pipeline\\:_groovy:1.0:*:*:*:*:jenkins:*:*",
"cpe:2.3:a:jenkins:pipeline\\:_groovy:1.1:*:*:*:*:jenkins:*:*",
"cpe:2.3:a:jenkins:pipeline\\:_groovy:1.2:*:*:*:*:jenkins:*:*",
"cpe:2.3:a:jenkins:pipeline\\:_groovy:1.3:*:*:*:*:jenkins:*:*",
"cpe:2.3:a:jenkins:pipeline\\:_groovy:1.4:*:*:*:*:je... | Jenkins Matrix Project Plugin Remote Code Execution Vulnerability | 2022-03-25 | Jenkins Matrix Project plugin contains a vulnerability which can allow users to escape the sandbox, opening opportunity to perform remote code execution. | Apply updates per vendor instructions. | 2023-10-25T18:16:00 |
7.5 | CWE-502 | 2022-04-15 | CVE-2019-10068 | Xperience | 2019-03-26T18:29:00 | Kentico | [
"http://packetstormsecurity.com/files/157588/Kentico-CMS-12.0.14-Remote-Command-Execution.html",
"https://devnet.kentico.com/download/hotfixes#securityBugs-v12"
] | [
"cpe:2.3:a:kentico:kentico:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kentico:kentico:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kentico:kentico:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kentico:kentico:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:kentico:kentico:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:kentico:kentico:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a... | Kentico Xperience Deserialization of Untrusted Data Vulnerability | 2022-03-25 | Kentico contains a failure to validate security headers. This deserialization can led to unauthenticated remote code execution. | Apply updates per vendor instructions. | 2020-04-15T16:15:00 |
10 | CWE-78 | 2022-07-10 | CVE-2019-10149 | Mail Transfer Agent (MTA) | 2019-06-05T14:29:00 | Exim | [
"https://www.exim.org/static/doc/security/CVE-2019-10149.txt",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10149",
"https://usn.ubuntu.com/4010-1/",
"http://www.openwall.com/lists/oss-security/2019/06/05/3",
"http://www.openwall.com/lists/oss-security/2019/06/05/2",
"http://www.openwall.com/list... | [
"cpe:2.3:a:exim:exim:4.87:*:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.87:rc1:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.87:rc2:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.87:rc3:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.87:rc4:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.87:rc5:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.87:rc6:*:*:*:*:*:*"... | Exim Mail Transfer Agent (MTA) Improper Input Validation | 2022-01-10 | Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution. | Apply updates per vendor instructions. | 2022-11-07T19:12:00 |
7.2 | CWE-59 | 2022-04-05 | CVE-2019-1064 | Windows | 2019-06-12T14:29:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1064"
] | [
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:... | Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability | 2022-03-15 | A privilege escalation vulnerability exists when Windows AppXSVC improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
7.2 | CWE-59 | 2022-04-05 | CVE-2019-1069 | Task Scheduler | 2019-06-12T14:29:00 | Microsoft | [
"https://blog.0patch.com/2019/06/another-task-scheduler-0day-another.html",
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1069",
"https://www.kb.cert.org/vuls/id/119704"
] | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*... | Microsoft Task Scheduler Privilege Escalation Vulnerability | 2022-03-15 | A privilege escalation vulnerability exists in the way the Task Scheduler Service validates certain file operations. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
9 | NVD-CWE-noinfo | 2022-06-10 | CVE-2019-10758 | mongo-express | 2019-12-24T22:15:00 | MongoDB | [
"https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215"
] | [
"cpe:2.3:a:mongo-express_project:mongo-express:0.2.1:*:*:*:*:node.js:*:*",
"cpe:2.3:a:mongo-express_project:mongo-express:0.2.2:*:*:*:*:node.js:*:*",
"cpe:2.3:a:mongo-express_project:mongo-express:0.2.3:*:*:*:*:node.js:*:*",
"cpe:2.3:a:mongo-express_project:mongo-express:0.3.0:*:*:*:*:node.js:*:*",
"cpe:2.3... | MongoDB mongo-express Remote Code Execution Vulnerability | 2021-12-10 | mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints that uses the `toBSON` method. | Apply updates per vendor instructions. | 2020-01-02T21:05:00 |
7.5 | CWE-787 | 2022-04-15 | CVE-2019-11043 | FastCGI Process Manager (FPM) | 2019-10-28T15:15:00 | PHP | [
"https://github.com/neex/phuip-fpizdam",
"https://bugs.php.net/bug.php?id=78599",
"https://usn.ubuntu.com/4166-1/",
"https://usn.ubuntu.com/4166-2/",
"https://www.debian.org/security/2019/dsa-4553",
"https://www.debian.org/security/2019/dsa-4552",
"https://support.f5.com/csp/article/K75408500?utm_source... | [
"cpe:2.3:a:php:php:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.1.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.1.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.1.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.1.0:beta2:*:*:*:*:... | PHP FastCGI Process Manager (FPM) Buffer Overflow Vulnerability | 2022-03-25 | In some versions of PHP in certain configurations of FPM setup, it is possible to cause FPM module to write past allocated buffers allowing the possibility of remote code execution. | Apply updates per vendor instructions. | 2021-07-22T18:15:00 |
7.2 | CWE-59 | 2022-04-05 | CVE-2019-1129 | Windows | 2019-07-15T19:15:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1129"
] | [
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:... | Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability | 2022-03-15 | A privilege escalation vulnerability exists when Windows AppXSVC improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
7.2 | CWE-59 | 2022-06-13 | CVE-2019-1130 | Windows | 2019-07-15T19:15:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1130"
] | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*... | Microsoft Windows AppX Deployment Service Privilege Escalation Vulnerability | 2022-05-23 | A privilege escalation vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
7.2 | NVD-CWE-noinfo | 2022-04-05 | CVE-2019-1132 | Win32k | 2019-07-15T19:15:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1132"
] | [
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"
] | Microsoft Win32k Privilege Escalation Vulnerability | 2022-03-15 | A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
7.5 | CWE-22 | 2021-04-23 | CVE-2019-11510 | Pulse Connect Secure | 2019-05-08T17:29:00 | Ivanti | [
"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/",
"https://kb.pulsesecure.net/?atype=sa",
"http://www.securityfocus.com/bid/108073",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010",
"http://packetstormsecurity.com/files/154176/Pulse-Secure-SSL-VPN-8.1R15.1-8.2-8.3-9... | [
"cpe:2.3:a:ivanti:connect_secure:9.0:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r2.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r3.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure... | Ivanti Pulse Connect Secure Arbitrary File Read Vulnerability | 2021-11-03 | Ivanti Pulse Connect Secure contains an arbitrary file read vulnerability that allows an unauthenticated remote attacker with network access via HTTPS to send a specially crafted URI. | Apply updates per vendor instructions. | 2024-02-27T21:04:00 |
6.5 | CWE-78 | 2022-05-03 | CVE-2019-11539 | Pulse Connect Secure and Pulse Policy Secure | 2019-04-26T02:29:00 | Ivanti | [
"http://www.securityfocus.com/bid/108073",
"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010",
"http://packetstormsecurity.com/files/154376/Pulse-Secure-8.1R15.1-8.2-8.3-9.0-SSL-VPN-Remote-Code-Execution.html",
"https://... | [
"cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_sec... | Ivanti Pulse Connect Secure and Policy Secure Command Injection Vulnerability | 2021-11-03 | Ivanti Pulse Connect Secure and Policy Secure allows an authenticated attacker from the admin web interface to inject and execute commands. | Apply updates per vendor instructions. | 2024-02-27T21:04:00 |
7.5 | NVD-CWE-noinfo | 2022-05-03 | CVE-2019-11580 | Crowd and Crowd Data Center | 2019-06-03T14:29:00 | Atlassian | [
"https://jira.atlassian.com/browse/CWD-5388",
"http://www.securityfocus.com/bid/108637",
"http://packetstormsecurity.com/files/163810/Atlassian-Crowd-pdkinstall-Remote-Code-Execution.html"
] | [
"cpe:2.3:a:atlassian:crowd:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:crowd:3.3.1:-:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:crowd:3.3.2:-:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:crowd:3.3.3:-:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:crowd:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:crowd:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a... | Atlassian Crowd and Crowd Data Center Remote Code Execution Vulnerability | 2021-11-03 | Atlassian Crowd and Crowd Data Center contain a remote code execution vulnerability resulting from a pdkinstall development plugin being incorrectly enabled in release builds. | Apply updates per vendor instructions. | 2022-04-19T15:36:00 |
9.3 | CWE-74 | 2022-09-07 | CVE-2019-11581 | Jira Server and Data Center | 2019-08-09T20:15:00 | Atlassian | [
"https://jira.atlassian.com/browse/JRASERVER-69532"
] | [
"cpe:2.3:a:atlassian:jira_server:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_server:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_server:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_server:8.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_server:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_serve... | Atlassian Jira Server and Data Center Server-Side Template Injection Vulnerability | 2022-03-07 | Atlassian Jira Server and Data Center contain a server-side template injection vulnerability which can allow for remote code execution. | Apply updates per vendor instructions. | 2022-03-25T17:22:00 |
7.5 | NVD-CWE-noinfo | 2022-05-03 | CVE-2019-11634 | Workspace Application and Receiver for Windows | 2019-05-22T17:29:00 | Citrix | [
"https://support.citrix.com/article/CTX251986",
"https://support.citrix.com/v1/search?searchQuery=%22%22&lang=en&sort=cr_date_desc&prod=&pver=&ct=Security+Bulletin"
] | [
"cpe:2.3:a:citrix:receiver:4.9:cumulative_update_6:*:*:windows:*:*:*",
"cpe:2.3:a:citrix:workspace:*:*:*:*:*:windows:*:*"
] | Citrix Workspace Application and Receiver for Windows Remote Code Execution Vulnerability | 2021-11-03 | Citrix Workspace Application and Receiver for Windows contains remote code execution vulnerability resulting from local drive access preferences not being enforced into the clients' local drives. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
7.5 | CWE-843 | 2022-06-13 | CVE-2019-11707 | Firefox and Thunderbird | 2019-07-23T14:15:00 | Mozilla | [
"https://www.mozilla.org/security/advisories/mfsa2019-20/",
"https://www.mozilla.org/security/advisories/mfsa2019-18/",
"https://bugzilla.mozilla.org/show_bug.cgi?id=1544386",
"https://security.gentoo.org/glsa/201908-12"
] | [
"cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
... | Mozilla Firefox and Thunderbird Type Confusion Vulnerability | 2022-05-23 | Mozilla Firefox and Thunderbird contain a type confusion vulnerability that can occur when manipulating JavaScript objects due to issues in Array.pop, allowing for an exploitable crash. | Apply updates per vendor instructions. | 2023-01-31T14:15:00 |
10 | CWE-20 | 2022-06-13 | CVE-2019-11708 | Firefox and Thunderbird | 2019-07-23T14:15:00 | Mozilla | [
"http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html",
"https://bugzilla.mozilla.org/show_bug.cgi?id=1559858",
"https://security.gentoo.org/glsa/201908-12",
"https://www.mozilla.org/security/advisories/mfsa2019-19/",
"https://www.mozilla.org/security/advisories/mfsa... | [
"cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firef... | Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability | 2022-05-23 | Mozilla Firefox and Thunderbird contain a sandbox escape vulnerability that could result in remote code execution. | Apply updates per vendor instructions. | 2019-08-15T18:15:00 |
7.2 | NVD-CWE-noinfo | 2022-05-03 | CVE-2019-1214 | Windows | 2019-09-11T22:15:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1214"
] | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*... | Microsoft Windows Privilege Common Log File System (CLFS) Escalation Vulnerability | 2021-11-03 | Microsoft Windows Common Log File System (CLFS) driver improperly handles objects in memory which can allow for privilege escalation. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
7.2 | NVD-CWE-noinfo | 2022-05-03 | CVE-2019-1215 | Windows | 2019-09-11T22:15:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1215"
] | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*... | Microsoft Windows Privilege Escalation Vulnerability | 2021-11-03 | Microsoft Windows contains an unspecified vulnerability due to the way ws2ifsl.sys (Winsock) handles objects in memory, allowing for privilege escalation. Successful exploitation allows an attacker to execute code with elevated privileges.� | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
7.2 | CWE-59 | 2022-04-05 | CVE-2019-1253 | Windows | 2019-09-11T22:15:00 | Microsoft | [
"http://packetstormsecurity.com/files/154488/AppXSvc-17763.1.amd64fre.rs5_release.180914-1434-Privilege-Escalation.html",
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1253"
] | [
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:... | Microsoft Windows AppX Deployment Server Privilege Escalation Vulnerability | 2022-03-15 | A privilege escalation vulnerability exists when the Windows AppX Deployment Server improperly handles junctions. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
9.3 | NVD-CWE-noinfo | 2022-03-17 | CVE-2019-1297 | Excel | 2019-09-11T22:15:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1297"
] | [
"cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:mac_os:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"c... | Microsoft Excel Remote Code Execution Vulnerability | 2022-03-03 | A remote code execution vulnerability exists in Microsoft Excel when the software fails to properly handle objects in memory. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
7.5 | CWE-89 | 2022-04-15 | CVE-2019-12989 | SD-WAN and NetScaler | 2019-07-16T18:15:00 | Citrix | [
"http://packetstormsecurity.com/files/153638/Citrix-SD-WAN-Appliance-10.2.2-Authentication-Bypass-Remote-Command-Execution.html",
"http://www.securityfocus.com/bid/109133",
"https://support.citrix.com/article/CTX251987",
"https://www.tenable.com/security/research/tra-2019-32"
] | [
"cpe:2.3:a:citrix:netscaler_sd-wan:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:netscaler_sd-wan:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:netscaler_sd-wan:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:netscaler_sd-wan:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:netscaler_sd-wan:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:citri... | Citrix SD-WAN and NetScaler SQL Injection Vulnerability | 2022-03-25 | Citrix SD-WAN and NetScaler SD-WAN allow SQL Injection. | Apply updates per vendor instructions. | 2019-11-20T20:51:00 |
9 | CWE-78 | 2022-04-15 | CVE-2019-12991 | SD-WAN and NetScaler | 2019-07-16T18:15:00 | Citrix | [
"http://packetstormsecurity.com/files/153638/Citrix-SD-WAN-Appliance-10.2.2-Authentication-Bypass-Remote-Command-Execution.html",
"http://www.securityfocus.com/bid/109133",
"https://support.citrix.com/article/CTX251987",
"https://www.tenable.com/security/research/tra-2019-32"
] | [
"cpe:2.3:a:citrix:netscaler_sd-wan:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:netscaler_sd-wan:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:netscaler_sd-wan:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:netscaler_sd-wan:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:netscaler_sd-wan:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:citri... | Citrix SD-WAN and NetScaler Command Injection Vulnerability | 2022-03-25 | Authenticated Command Injection in Citrix SD-WAN Appliance and NetScaler SD-WAN Appliance. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
7.2 | CWE-59 | 2022-04-05 | CVE-2019-1315 | Windows | 2019-10-10T14:15:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1315"
] | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*... | Microsoft Windows Error Reporting Manager Privilege Escalation Vulnerability | 2022-03-15 | A privilege escalation vulnerability exists when Windows Error Reporting manager improperly handles hard links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
4.6 | NVD-CWE-noinfo | 2022-04-05 | CVE-2019-1322 | Windows | 2019-10-10T14:15:00 | Microsoft | [
"http://packetstormsecurity.com/files/155723/Microsoft-UPnP-Local-Privilege-Elevation.html",
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1322"
] | [
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:wi... | Microsoft Windows Privilege Escalation Vulnerability | 2022-03-15 | A privilege escalation vulnerability exists when Windows improperly handles authentication requests. An attacker who successfully exploited this vulnerability could run processes in an elevated context. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
7.2 | CWE-269 | 2022-06-10 | CVE-2019-13272 | Kernel | 2019-07-17T13:15:00 | Linux | [
"https://bugs.chromium.org/p/project-zero/issues/detail?id=1903",
"http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html",
"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17",
"https://github.com/torvalds/linux/commit/6994eefb0053799d2e07c... | [
"cpe:2.3:o:linux:linux_kernel:4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.10:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.10:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.10:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.10:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.10:rc4:*:*:*:... | Linux Kernel Improper Privilege Management Vulnerability | 2021-12-10 | Kernel/ptrace.c in Linux kernel mishandles contains an improper privilege management vulnerability that allows local users to obtain root access. | Apply updates per vendor instructions. | 2023-01-17T21:25:00 |
5 | CWE-611 | 2022-05-03 | CVE-2019-13608 | StoreFront Server | 2019-08-29T19:15:00 | Citrix | [
"https://support.citrix.com/article/CTX251988"
] | [
"cpe:2.3:a:citrix:storefront_server:-:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:storefront_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:storefront_server:3.0.8000:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:storefront_server:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:storefront_server:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:store... | Citrix StoreFront Server XML External Entity (XXE) Processing Vulnerability | 2021-11-03 | Citrix StoreFront Server contains an XML External Entity (XXE) processing vulnerability that may allow an unauthenticated attacker to retrieve potentially sensitive information. | Apply updates per vendor instructions. | 2019-09-04T17:24:00 |
7.6 | CWE-787 | 2022-05-03 | CVE-2019-1367 | Internet Explorer | 2019-09-23T20:15:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1367"
] | [
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*"
] | Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability | 2021-11-03 | Microsoft Internet Explorer contains a memory corruption vulnerability in how the scripting engine handles objects in memory. Successful exploitation allows for remote code execution in the context of the current user. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
6.8 | CWE-416 | 2022-06-13 | CVE-2019-13720 | Chrome WebAudio | 2019-11-25T15:15:00 | Google | [
"https://crbug.com/1019226",
"https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_31.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00022.html",
"https://security.gentoo.org/glsa/202004-04",
"http://packetstormsecurity.com/files/167066/Google-Chrome-78.0.... | [
"cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.38.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.38.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.38.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.40.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.42.2:*:*:*:*:*:*:*",
"cpe:2.3:a:... | Google Chrome WebAudio Use-After-Free Vulnerability | 2022-05-23 | Google Chrome WebAudio contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. | Apply updates per vendor instructions. | 2024-02-15T02:00:00 |
6.1 | CWE-59 | 2022-06-13 | CVE-2019-1385 | Windows | 2019-11-12T19:15:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1385",
"https://www.zerodayinitiative.com/advisories/ZDI-19-979/"
] | [
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_ser... | Microsoft Windows AppX Deployment Extensions Privilege Escalation Vulnerability | 2022-05-23 | A privilege escalation vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
7.2 | CWE-269 | 2023-04-28 | CVE-2019-1388 | Windows | 2019-11-12T19:15:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1388",
"https://www.zerodayinitiative.com/advisories/ZDI-19-975/"
] | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*... | Microsoft Windows Certificate Dialog Privilege Escalation Vulnerability | 2023-04-07 | Microsoft Windows Certificate Dialog contains a privilege escalation vulnerability, allowing attackers to run processes in an elevated context. | Apply updates per vendor instructions. | 2019-11-14T19:19:00 |
7.2 | NVD-CWE-noinfo | 2022-04-05 | CVE-2019-1405 | Windows | 2019-11-12T19:15:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1405",
"http://packetstormsecurity.com/files/155723/Microsoft-UPnP-Local-Privilege-Elevation.html"
] | [
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o... | Microsoft Windows Universal Plug and Play (UPnP) Service Privilege Escalation Vulnerability | 2022-03-15 | A privilege escalation vulnerability exists when the Windows UPnP service improperly allows COM object creation. | Apply updates per vendor instructions. | 2023-03-01T15:32:00 |
7.6 | CWE-416 | 2022-05-03 | CVE-2019-1429 | Internet Explorer | 2019-11-12T19:15:00 | Microsoft | [
"http://packetstormsecurity.com/files/155433/Microsoft-Internet-Explorer-Use-After-Free.html",
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1429"
] | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability | 2021-11-03 | Microsoft Internet Explorer contains a memory corruption vulnerability which can allow for remote code execution in the context of the current user. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
7.2 | NVD-CWE-noinfo | 2022-07-10 | CVE-2019-1458 | Win32k | 2019-12-10T22:15:00 | Microsoft | [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1458",
"http://packetstormsecurity.com/files/156651/Microsoft-Windows-WizardOpium-Local-Privilege-Escalation.html",
"http://packetstormsecurity.com/files/159569/Microsoft-Windows-Uninitialized-Variable-Local-Privilege-Escalation.html"
... | [
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:micr... | Microsoft Win32k Privilege Escalation Vulnerability | 2022-01-10 | A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k EoP. | Apply updates per vendor instructions. | 2023-01-30T19:57:00 |
10 | CWE-78 | 2022-04-15 | CVE-2019-15107 | Webmin | 2019-08-16T03:15:00 | Webmin | [
"https://www.exploit-db.com/exploits/47230",
"http://www.pentest.com.tr/exploits/DEFCON-Webmin-1920-Unauthenticated-Remote-Command-Execution.html",
"http://packetstormsecurity.com/files/154141/Webmin-Remote-Comman-Execution.html",
"http://packetstormsecurity.com/files/154141/Webmin-1.920-Remote-Command-Execut... | [
"cpe:2.3:a:webmin:webmin:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.22:*:*... | Webmin Command Injection Vulnerability | 2022-03-25 | An issue was discovered in Webmin. The parameter old in password_change.cgi contains a command injection vulnerability. | Apply updates per vendor instructions. | 2023-02-28T15:23:00 |
9 | CWE-502 | 2022-06-22 | CVE-2019-15271 | RV Series Routers | 2019-11-26T03:15:00 | Cisco | [
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbrv-cmd-x"
] | [
"cpe:2.3:o:cisco:rv016_multi-wan_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042_dual_wan_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042g_dual_gigabit_wan_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv082_dual_wan_vpn_firmware:*:*:*:*:*:*:*:*"
] | Cisco RV Series Routers Deserialization of Untrusted Data Vulnerability | 2022-06-08 | A deserialization of untrusted data vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an attacker to execute code with root privileges. | Apply updates per vendor instructions. | 2019-12-11T16:27:00 |
9.3 | CWE-732 | 2022-05-03 | CVE-2019-15752 | Desktop Community Edition | 2019-08-28T21:15:00 | Docker | [
"http://packetstormsecurity.com/files/157404/Docker-Credential-Wincred.exe-Privilege-Escalation.html",
"https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E",
"https://medium.com/@morgan.henry.roman/elevation-of-privilege-in-docker-for-wind... | [
"cpe:2.3:a:docker:docker:1.12.0:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:1.12.1:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:1.12.3:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:1.12.4:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:1.12.5:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:1... | Docker Desktop Community Edition Privilege Escalation Vulnerability | 2021-11-03 | Docker Desktop Community Edition contains a vulnerability that may allow local users to escalate privileges by placing a trojan horse docker-credential-wincred.exe file in %PROGRAMDATA%\DockerDesktop\version-bin\. | Apply updates per vendor instructions. | 2020-08-31T14:15:00 |
6.8 | CWE-134 | 2022-07-10 | CVE-2019-1579 | PAN-OS | 2019-07-19T22:15:00 | Palo Alto Networks | [
"http://www.securityfocus.com/bid/109310",
"https://devco.re/blog/2019/07/17/attacking-ssl-vpn-part-1-PreAuth-RCE-on-Palo-Alto-GlobalProtect-with-Uber-as-case-study/",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010",
"https://security.paloaltonetworks.com/CVE-2019-1579"
] | [
"cpe:2.3:o:paloaltonetworks:pan-os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-o... | Palo Alto Networks PAN-OS Remote Code Execution Vulnerability | 2022-01-10 | Remote Code Execution in PAN-OS with GlobalProtect Portal or GlobalProtect Gateway Interface enabled. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
9 | CWE-78 | 2022-05-03 | CVE-2019-15949 | Nagios XI | 2019-09-05T17:15:00 | Nagios | [
"https://github.com/jakgibb/nagiosxi-root-rce-exploit",
"http://packetstormsecurity.com/files/156676/Nagios-XI-Authenticated-Remote-Command-Execution.html",
"http://packetstormsecurity.com/files/162158/Nagios-XI-getprofile.sh-Remote-Command-Execution.html"
] | [
"cpe:2.3:a:nagios:nagios_xi:5:r1.0:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios_xi:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios_xi:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios_xi:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios_xi:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios_xi:5.2.4:*:*:*:*:*:*:*",
"cpe:... | Nagios XI Remote Code Execution Vulnerability | 2021-11-03 | Nagios XI contains a remote code execution vulnerability in which a user can modify the check_plugin executable and insert malicious commands to execute as root. | Apply updates per vendor instructions. | 2021-04-15T21:16:00 |
10 | CWE-78 | 2022-05-06 | CVE-2019-16057 | DNS-320 Storage Device | 2019-09-16T12:15:00 | D-Link | [
"https://blog.cystack.net/d-link-dns-320-rce/",
"https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgment_7-2-19.pdf"
] | [
"cpe:2.3:o:dlink:dns-320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-320_firmware:2.00:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-320_firmware:2.02:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-320_firmware:2.03:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-320_firmware:2.05:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-320_firmware:... | D-Link DNS-320 Remote Code Execution Vulnerability | 2022-04-15 | The login_mgr.cgi script in D-Link DNS-320 is vulnerable to remote code execution. | The impacted product is end-of-life and should be disconnected if still in use. | 2019-09-16T19:58:00 |
7.5 | NVD-CWE-noinfo | 2022-05-03 | CVE-2019-16256 | Toolbox Browser | 2019-09-12T13:15:00 | SIMalliance | [
"https://www.adaptivemobile.com/blog/simjacker-next-generation-spying-over-mobile"
] | [
"cpe:2.3:o:samsung:samsung_firmware:-:*:*:*:*:*:*:*"
] | SIMalliance Toolbox Browser Command Injection Vulnerability | 2021-11-03 | SIMalliance Toolbox Browser contains an command injection vulnerability that could allow remote attackers to retrieve location and IMEI information or execute a range of other attacks by modifying the attack message. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
9 | CWE-78 | 2022-03-17 | CVE-2019-1652 | Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers | 2019-01-24T15:29:00 | Cisco | [
"http://packetstormsecurity.com/files/152262/Cisco-RV320-Command-Injection.html",
"http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html",
"http://seclists.org/fulldisclosure/2019/Mar/61",
"http://www.securityfocus.com/bid/106728",
"https://seclists.org/bug... | [
"cpe:2.3:o:cisco:rv320_firmware:1.4.2.15:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv325_firmware:1.4.2.15:*:*:*:*:*:*:*"
] | Cisco Small Business Routers Improper Input Validation Vulnerability | 2022-03-03 | A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands. | Apply updates per vendor instructions. | 2020-10-05T19:34:00 |
5 | CWE-200 | 2022-05-03 | CVE-2019-1653 | Small Business RV320 and RV325 Routers | 2019-01-24T16:29:00 | Cisco | [
"http://packetstormsecurity.com/files/152260/Cisco-RV320-Unauthenticated-Configuration-Export.html",
"http://packetstormsecurity.com/files/152261/Cisco-RV320-Unauthenticated-Diagnostic-Data-Retrieval.html",
"http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html... | [
"cpe:2.3:o:cisco:rv320_firmware:1.4.2.15:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv320_firmware:1.4.2.17:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv325_firmware:1.4.2.15:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv325_firmware:1.4.2.17:*:*:*:*:*:*:*"
] | Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability | 2021-11-03 | Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers contain improper access controls for URLs. Exploitation could allow an attacker to download the router configuration or detailed diagnostic information. | Apply updates per vendor instructions. | 2020-10-05T19:37:00 |
7.5 | CWE-20 | 2022-05-03 | CVE-2019-16759 | vBulletin | 2019-09-24T22:15:00 | vBulletin | [
"https://seclists.org/fulldisclosure/2019/Sep/31",
"https://www.theregister.co.uk/2019/09/24/vbulletin_vbug_zeroday/",
"https://arstechnica.com/information-technology/2019/09/public-exploit-code-spawns-mass-attacks-against-high-severity-vbulletin-bug/",
"http://packetstormsecurity.com/files/154623/vBulletin-5... | [
"cpe:2.3:a:vbulletin:vbulletin:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:5.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:5.0.0:beta_11:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:5.0.0:beta_28:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulleti... | vBulletin PHP Module Remote Code Execution Vulnerability | 2021-11-03 | The PHP module within vBulletin contains an unspecified vulnerability that allows for remote code execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request. | Apply updates per vendor instructions. | 2021-07-21T11:39:00 |
10 | CWE-78 | 2022-04-15 | CVE-2019-16920 | Multiple Routers | 2019-09-27T12:15:00 | D-Link | [
"https://fortiguard.com/zeroday/FG-VD-19-117",
"https://medium.com/@80vul/determine-the-device-model-affected-by-cve-2019-16920-by-zoomeye-bf6fec7f9bb3",
"https://www.kb.cert.org/vuls/id/766427",
"https://www.seebug.org/vuldb/ssvid-98079"
] | [
"cpe:2.3:o:dlink:dir-655_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-866l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dhp-1565_firmware:*:*:*:*:*:*:*:*"
] | D-Link Multiple Routers Command Injection Vulnerability | 2022-03-25 | Multiple D-Link routers contain a command injection vulnerability which can allow attackers to achieve full system compromise. | The impacted product is end-of-life and should be disconnected if still in use. | 2019-10-10T21:15:00 |
7.5 | CWE-787 | 2022-03-17 | CVE-2019-16928 | Exim Internet Mailer | 2019-09-27T21:15:00 | Exim | [
"https://git.exim.org/exim.git/commit/478effbfd9c3cc5a627fc671d4bf94d13670d65f",
"https://lists.exim.org/lurker/message/20190927.032457.c1044d4c.en.html",
"https://bugs.exim.org/show_bug.cgi?id=2449",
"http://www.openwall.com/lists/oss-security/2019/09/28/1",
"http://www.openwall.com/lists/oss-security/2019... | [
"cpe:2.3:a:exim:exim:4.92:-:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.92:rc1:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.92:rc2:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.92:rc3:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.92:rc4:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.92:rc5:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.92:rc6:*:*:*:*:*:*"... | Exim Out-of-bounds Write Vulnerability | 2022-03-03 | Exim contains an out-of-bounds write vulnerability which can allow for remote code execution. | Apply updates per vendor instructions. | 2022-03-31T17:50:00 |
6.8 | CWE-843 | 2022-05-03 | CVE-2019-17026 | Firefox and Thunderbird | 2020-03-02T05:15:00 | Mozilla | [
"https://www.mozilla.org/security/advisories/mfsa2020-03/",
"https://www.mozilla.org/security/advisories/mfsa2020-04/",
"https://bugzilla.mozilla.org/show_bug.cgi?id=1607443",
"https://security.gentoo.org/glsa/202003-02",
"https://usn.ubuntu.com/4335-1/",
"http://packetstormsecurity.com/files/162568/Firef... | [
"cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firef... | Mozilla Firefox And Thunderbird Type Confusion Vulnerability | 2021-11-03 | Mozilla Firefox and Thunderbird contain a type confusion vulnerability due to incorrect alias information in the IonMonkey JIT compiler when setting array elements. | Apply updates per vendor instructions. | 2022-11-16T03:00:00 |
4.6 | CWE-74 | 2022-05-03 | CVE-2019-17558 | Solr | 2019-12-30T17:15:00 | Apache | [
"https://issues.apache.org/jira/browse/SOLR-13971",
"https://lists.apache.org/thread.html/rb964fe5c4e3fc05f75e8f74bf6b885f456b7a7750c36e9a8045c627a@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/r9271d030452170ba6160c022757e1b5af8a4c9ccf9e04164dec02e7f@%3Cissues.lucene.apache.org%3E",
... | [
"cpe:2.3:a:apache:solr:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:5.3.0:*:*:*:*:*... | Apache Solr VelocityResponseWriter Plug-In Remote Code Execution Vulnerability | 2021-11-03 | The Apache Solr VelocityResponseWriter plug-in contains an unspecified vulnerability which can allow for remote code execution. | Apply updates per vendor instructions. | 2022-02-20T06:42:00 |
10 | CWE-78 | 2023-07-20 | CVE-2019-17621 | DIR-859 Router | 2019-12-30T17:15:00 | D-Link | [
"https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10147",
"https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgment_7-2-19.pdf",
"https://www.dlink.com/en/security-bulletin",
"https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SA... | [
"cpe:2.3:o:dlink:dir-859_firmware:1.03.b04:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-859_firmware:1.05:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-859_firmware:1.05b03:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-859_firmware:1.06b01:beta1:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-822_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir... | D-Link DIR-859 Router Command Execution Vulnerability | 2023-06-29 | D-Link DIR-859 router contains a command execution vulnerability in the UPnP endpoint URL, /gena.cgi. Exploitation allows an unauthenticated remote attacker to execute system commands as root by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network. | Apply updates per vendor instructions or discontinue use of the product if updates are unavailable. | 2023-01-20T20:40:00 |
5 | CWE-22 | 2022-05-03 | CVE-2019-18187 | OfficeScan | 2019-10-28T20:15:00 | Trend Micro | [
"https://success.trendmicro.com/solution/000151730"
] | [
"cpe:2.3:a:trendmicro:officescan:11.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:officescan:xg:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:officescan:xg:sp1:*:*:*:*:*:*"
] | Trend Micro OfficeScan Directory Traversal Vulnerability | 2021-11-03 | Trend Micro OfficeScan contains a directory traversal vulnerability by extracting files from a zip file to a specific folder on the OfficeScan server, leading to remote code execution. | Apply updates per vendor instructions. | 2019-10-31T20:59:00 |
5.8 | CWE-79 | 2022-06-13 | CVE-2019-18426 | WhatsApp | 2020-01-21T21:15:00 | Meta Platforms | [
"https://www.facebook.com/security/advisories/cve-2019-18426",
"http://packetstormsecurity.com/files/157097/WhatsApp-Desktop-0.3.9308-Cross-Site-Scripting.html"
] | [
"cpe:2.3:a:whatsapp:whatsapp:-:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:whatsapp:whatsapp:2.2.5:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:whatsapp:whatsapp:2.6.4:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:whatsapp:whatsapp:2.6.5:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:whatsapp:whatsapp:2.6.6:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:what... | WhatsApp Cross-Site Scripting Vulnerability | 2022-05-23 | A vulnerability in WhatsApp Desktop when paired with WhatsApp for iPhone allows cross-site scripting and local file reading. | Apply updates per vendor instructions. | 2023-01-31T20:06:00 |
7.5 | CWE-502 | 2022-05-03 | CVE-2019-18935 | Telerik UI for ASP.NET AJAX | 2019-12-11T13:15:00 | Progress | [
"https://www.telerik.com/support/whats-new/release-history",
"https://www.telerik.com/support/kb/aspnet-ajax/details/allows-javascriptserializer-deserialization",
"https://codewhitesec.blogspot.com/2019/02/telerik-revisited.html",
"https://github.com/bao7uo/RAU_crypto",
"https://know.bishopfox.com/research/... | [
"cpe:2.3:a:telerik:ui_for_asp.net_ajax:2011.1.315:*:*:*:*:*:*:*",
"cpe:2.3:a:telerik:ui_for_asp.net_ajax:2011.3.1305:*:*:*:*:*:*:*",
"cpe:2.3:a:telerik:ui_for_asp.net_ajax:2011.1315:*:*:*:*:*:*:*",
"cpe:2.3:a:telerik:ui_for_asp.net_ajax:2011.1413:*:*:*:*:*:*:*",
"cpe:2.3:a:telerik:ui_for_asp.net_ajax:2011.1... | Progress Telerik UI for ASP.NET AJAX Deserialization of Untrusted Data Vulnerability | 2021-11-03 | Progress Telerik UI for ASP.NET AJAX contains a deserialization of untrusted data vulnerability through RadAsyncUpload which leads to code execution on the server in the context of the w3wp.exe process. | Apply updates per vendor instructions. | 2023-03-15T18:15:00 |
4.4 | CWE-521 | 2022-05-03 | CVE-2019-18988 | Desktop | 2020-02-07T16:15:00 | TeamViewer | [
"https://community.teamviewer.com/t5/Announcements/Specification-on-CVE-2019-18988/td-p/82264",
"https://community.teamviewer.com/t5/Knowledge-Base/tkb-p/Knowledgebase?threadtype=label&labels=Security",
"https://twitter.com/Blurbdust/status/1224212682594770946?s=20",
"https://whynotsecurity.com/blog/teamviewe... | [
"cpe:2.3:a:teamviewer:teamviewer:-:*:*:*:*:*:*:*",
"cpe:2.3:a:teamviewer:teamviewer:1.85:*:*:*:*:*:*:*",
"cpe:2.3:a:teamviewer:teamviewer:2.44:*:*:*:*:*:*:*",
"cpe:2.3:a:teamviewer:teamviewer:3.6.5523:*:*:*:*:*:*:*",
"cpe:2.3:a:teamviewer:teamviewer:4.1.8107:*:*:*:*:*:*:*",
"cpe:2.3:a:teamviewer:teamviewe... | TeamViewer Desktop Bypass Remote Login Vulnerability | 2021-11-03 | TeamViewer Desktop allows for bypass of remote-login access control because the same AES key is used for different customers' installations. If an attacker were to know this key, they could decrypt protected information stored in registry or configuration files or decryption of the Unattended Access password to the sys... | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
8.5 | CWE-78 | 2022-05-03 | CVE-2019-19356 | WF2419 Devices | 2020-02-07T23:15:00 | Netis | [
"https://www.digital.security/en/blog/netis-routers-remote-code-execution-cve-2019-19356",
"https://github.com/shadowgatt/CVE-2019-19356",
"http://packetstormsecurity.com/files/156588/Netis-WF2419-2.2.36123-Remote-Code-Execution.html"
] | [
"cpe:2.3:o:netis-systems:wf2419_firmware:1.2.31805:*:*:*:*:*:*:*",
"cpe:2.3:o:netis-systems:wf2419_firmware:2.2.36123:*:*:*:*:*:*:*"
] | Netis WF2419 Devices Remote Code Execution Vulnerability | 2021-11-03 | Netis WF2419 devices contains an unspecified vulnerability that allows an attacker to perform remote code execution as root through the router's web management page. | Apply updates per vendor instructions. | 2022-01-01T19:57:00 |
7.5 | CWE-22 | 2022-05-03 | CVE-2019-19781 | Application Delivery Controller (ADC), Gateway, and SD-WAN WANOP Appliance | 2019-12-27T14:15:00 | Citrix | [
"https://support.citrix.com/article/CTX267027",
"https://www.kb.cert.org/vuls/id/619785",
"https://twitter.com/bad_packets/status/1215431625766424576",
"https://forms.gle/eDf3DXZAv96oosfj6",
"https://badpackets.net/over-25000-citrix-netscaler-endpoints-vulnerable-to-cve-2019-19781/",
"http://packetstormse... | [
"cpe:2.3:o:citrix:application_delivery_controller_firmware:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:application_delivery_controller_firmware:11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:application_delivery_controller_firmware:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:application_delivery_controller_firmware:12.1:*:*:*:... | Citrix ADC, Gateway, and SD-WAN WANOP Appliance Code Execution Vulnerability | 2021-11-03 | Citrix ADC, Citrix Gateway, and multiple Citrix SD-WAN WANOP appliance models contain an unspecified vulnerability that could allow an unauthenticated attacker to perform code execution. | Apply updates per vendor instructions. | 2023-01-20T16:21:00 |
5 | CWE-22 | 2022-05-03 | CVE-2019-20085 | NVMS-1000 | 2019-12-30T03:15:00 | TVT | [
"https://www.exploit-db.com/exploits/47774",
"http://packetstormsecurity.com/files/157196/TVT-NVMS-1000-Directory-Traversal.html"
] | [
"cpe:2.3:o:tvt:nvms-1000_firmware:-:*:*:*:*:*:*:*"
] | TVT NVMS-1000 Directory Traversal Vulnerability | 2021-11-03 | TVT devices utilizing NVMS-1000 software contain a directory traversal vulnerability via GET /.. requests. | Apply updates per vendor instructions. | 2023-01-20T20:24:00 |
7.2 | CWE-78 | 2023-07-20 | CVE-2019-20500 | DWL-2600AP Access Point | 2020-03-05T15:15:00 | D-Link | [
"https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10113",
"https://www.exploit-db.com/exploits/46841"
] | [
"cpe:2.3:o:dlink:dwl-2600ap_firmware:*:*:*:*:*:*:*:*"
] | D-Link DWL-2600AP Access Point Command Injection Vulnerability | 2023-06-29 | D-Link DWL-2600AP access point contains an authenticated command injection vulnerability via the Save Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_save configBackup or downloadServerip parameter. | Apply updates per vendor instructions or discontinue use of the product if updates are unavailable. | 2023-04-26T19:27:00 |
4.6 | CWE-416 | 2022-05-03 | CVE-2019-2215 | Android Kernel | 2019-10-11T19:15:00 | Android | [
"http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html",
"http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
"http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html",
"http://seclists.org/fulldisclosure/... | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | Android Kernel Use-After-Free Vulnerability | 2021-11-03 | Android Kernel contains a use-after-free vulnerability in binder.c that allows for privilege escalation from an application to the Linux Kernel. This vulnerability was observed chained with CVE-2020-0041 and CVE-2020-0069 under exploit chain "AbstractEmu." | Apply updates per vendor instructions. | 2019-10-18T19:15:00 |
6.4 | NVD-CWE-noinfo | 2022-04-15 | CVE-2019-2616 | BI Publisher (Formerly XML Publisher) | 2019-04-23T19:32:00 | Oracle | [
"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
] | [
"cpe:2.3:a:oracle:business_intelligence_publisher:11.1.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_intelligence_publisher:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_intelligence_publisher:12.2.1.4.0:*:*:*:*:*:*:*"
] | Oracle BI Publisher Unauthorized Access Vulnerability | 2022-03-25 | Oracle BI Publisher, formerly XML Publisher, contains an unspecified vulnerability that allows for various unauthorized actions. Open-source reporting attributes this vulnerability to allowing for authentication bypass. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
7.5 | CWE-74 | 2022-07-10 | CVE-2019-2725 | WebLogic Server | 2019-04-26T19:29:00 | Oracle | [
"http://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html",
"https://support.f5.com/csp/article/K90059138",
"https://www.exploit-db.com/exploits/46780/",
"http://www.securityfocus.com/bid/108074",
"http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization... | [
"cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_plm:9.3.3:*:*:*:... | Oracle WebLogic Server, Injection | 2022-01-10 | Injection vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). | Apply updates per vendor instructions. | 2022-04-27T16:39:00 |
4.6 | NVD-CWE-noinfo | 2022-06-15 | CVE-2019-3010 | Solaris | 2019-10-16T18:15:00 | Oracle | [
"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"http://seclists.org/fulldisclosure/2019/Oct/39",
"http://packetstormsecurity.com/files/154960/Solaris-xscreensaver-Privilege-Escalation.html"
] | [
"cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*"
] | Oracle Solaris Privilege Escalation Vulnerability | 2022-05-25 | Oracle Solaris component: XScreenSaver contains an unspecified vulnerability that allows for privilege escalation. | Apply updates per vendor instructions. | 2023-01-31T19:05:00 |
10 | CWE-22 | 2022-05-03 | CVE-2019-3396 | Confluence Server and Data Server | 2019-03-25T19:29:00 | Atlassian | [
"https://jira.atlassian.com/browse/CONFSERVER-57974",
"http://packetstormsecurity.com/files/152568/Atlassian-Confluence-Widget-Connector-Macro-Velocity-Template-Injection.html",
"http://www.rapid7.com/db/modules/exploit/multi/http/confluence_widget_connector",
"https://www.exploit-db.com/exploits/46731/",
"... | [
"cpe:2.3:a:atlassian:confluence:-:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence:1.1.1:*:*:*:... | Atlassian Confluence Server and Data Center Server-Side Template Injection Vulnerability | 2021-11-03 | Atlassian Confluence Server and Data Center contain a server-side template injection vulnerability that may allow an attacker to achieve path traversal and remote code execution. | Apply updates per vendor instructions. | 2021-12-13T16:05:00 |
9 | CWE-22 | 2022-05-03 | CVE-2019-3398 | Confluence Server and Data Center | 2019-04-18T18:29:00 | Atlassian | [
"https://jira.atlassian.com/browse/CONFSERVER-58102",
"https://seclists.org/bugtraq/2019/Apr/33",
"http://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-Traversal.html",
"http://www.securityfocus.com/bid/108067",
"http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15... | [
"cpe:2.3:a:atlassian:confluence:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence:2.1.2:... | Atlassian Confluence Server and Data Center Path Traversal Vulnerability | 2021-11-03 | Atlassian Confluence Server and Data Center contain a path traversal vulnerability in the downloadallattachments resource that may allow a privileged, remote attacker to write files. Exploitation can lead to remote code execution. | Apply updates per vendor instructions. | 2022-04-12T18:39:00 |
7.5 | CWE-119 | 2022-05-10 | CVE-2019-3568 | WhatsApp | 2019-05-14T20:29:00 | Meta Platforms | [
"http://www.securityfocus.com/bid/108329",
"https://www.facebook.com/security/advisories/cve-2019-3568"
] | [
"cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:tizen:*:*",
"cpe:2.3:a:whatsapp:whatsapp:2.11.494:*:*:*:*:windows_phone:*:*",
"cpe:2.3:a:whatsapp:whatsapp:2.11.504:*:*:*:*:windows_phone:*:*",
"cpe:2.3:a:whatsapp:whatsapp:2.11.516:*:*:*:*:windows_phone:*:*",
"cpe:2.3:a:whatsapp:whatsapp:2.11.587:*:*:*:*:windows_phone... | WhatsApp VOIP Stack Buffer Overflow Vulnerability | 2022-04-19 | A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. | Apply updates per vendor instructions. | 2019-08-13T21:15:00 |
10 | CWE-78 | 2022-05-06 | CVE-2019-3929 | Multiple Products | 2019-04-30T21:29:00 | Crestron | [
"http://packetstormsecurity.com/files/152715/Barco-AWIND-OEM-Presentation-Platform-Unauthenticated-Remote-Command-Injection.html",
"http://packetstormsecurity.com/files/155948/Barco-WePresent-file_transfer.cgi-Command-Injection.html",
"https://www.exploit-db.com/exploits/46786/",
"https://www.tenable.com/secu... | [
"cpe:2.3:o:crestron:am-100_firmware:1.6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:crestron:am-101_firmware:2.7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:barco:wepresent_wipg-1000p_firmware:2.3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:barco:wepresent_wipg-1600w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:extron:sharelink_200_firmware:2.0.3.4:*:... | Crestron Multiple Products Command Injection Vulnerability | 2022-04-15 | Multiple Crestron products are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root. | Apply updates per vendor instructions. | 2020-10-16T18:09:00 |
10 | CWE-94 | 2022-05-03 | CVE-2019-4716 | Planning Analytics | 2019-12-18T17:16:00 | IBM | [
"https://www.ibm.com/support/pages/node/1127781",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/172094",
"http://seclists.org/fulldisclosure/2020/Mar/44",
"http://packetstormsecurity.com/files/156953/IBM-Cognos-TM1-IBM-Planning-Analytics-Server-Configuration-Overwrite-Code-Execution.html"
] | [
"cpe:2.3:a:ibm:planning_analytics:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:planning_analytics:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:planning_analytics:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:planning_analytics:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:planning_analytics:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:planning_anal... | IBM Planning Analytics Remote Code Execution Vulnerability | 2021-11-03 | IBM Planning Analytics is vulnerable to a configuration overwrite that allows an unauthenticated user to login as "admin", and then execute code as root or SYSTEM via TM1 scripting. | Apply updates per vendor instructions. | 2023-02-01T20:34:00 |
7.5 | CWE-787 | 2022-05-03 | CVE-2019-5544 | VMware ESXi and Horizon DaaS | 2019-12-06T16:15:00 | VMware | [
"http://www.vmware.com/security/advisories/VMSA-2019-0022.html",
"http://www.openwall.com/lists/oss-security/2019/12/10/2",
"http://www.openwall.com/lists/oss-security/2019/12/11/2",
"https://access.redhat.com/errata/RHSA-2019:4240",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedo... | [
"cpe:2.3:a:vmware:horizon_daas:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:horizon_daas:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6... | VMware ESXi and Horizon DaaS OpenSLP Heap-Based Buffer Overflow Vulnerability | 2021-11-03 | VMware ESXi and Horizon Desktop as a Service (DaaS) OpenSLP contains a heap-based buffer overflow vulnerability that allows an attacker with network access to port 427 to overwrite the heap of the OpenSLP service to perform remote code execution. | Apply updates per vendor instructions. | 2022-02-03T19:50:00 |
3.3 | CWE-200 | 2022-05-03 | CVE-2019-5591 | FortiOS | 2020-08-14T16:15:00 | Fortinet | [
"https://www.fortiguard.com/psirt/FG-IR-19-037"
] | [
"cpe:2.3:o:fortinet:fortios:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:3.3.6:*:*:*:*:*:*:*",
"cpe... | Fortinet FortiOS Default Configuration Vulnerability | 2021-11-03 | Fortinet FortiOS contains a default configuration vulnerability that may allow an unauthenticated attacker on the same subnet to intercept sensitive information by impersonating the Lightweight Directory Access Protocol (LDAP) server. | Apply updates per vendor instructions. | 2021-07-21T11:39:00 |
4.3 | CWE-416 | 2022-06-13 | CVE-2019-5786 | Chrome Blink | 2019-06-27T17:15:00 | Google | [
"https://crbug.com/936448",
"https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop.html"
] | [
"cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.38.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.38.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.38.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.40.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.42.2:*:*:*:*:*:*:*",
"cpe:2.3:a:... | Google Chrome Blink Use-After-Free Vulnerability | 2022-05-23 | Google Chrome Blink contains a heap use-after-free vulnerability that allows an attacker to potentially perform out of bounds memory access via a crafted HTML page. | Apply updates per vendor instructions. | 2024-02-15T02:00:00 |
4.3 | CWE-787 | 2022-06-22 | CVE-2019-5825 | Chromium V8 | 2019-11-25T20:15:00 | Google | [
"https://crbug.com/941743",
"https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html",
"http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html"
] | [
"cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.38.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.38.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.38.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.40.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.42.2:*:*:*:*:*:*:*",
"cpe:2.3:a:... | Google Chromium V8 Out-of-Bounds Write Vulnerability | 2022-06-08 | Google Chromium V8 Engine contains an out-of-bounds write vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. | Apply updates per vendor instructions. | 2022-10-07T18:57:00 |
5 | NVD-CWE-noinfo | 2022-05-03 | CVE-2019-6223 | iOS and macOS | 2019-03-05T16:29:00 | Apple | [
"https://support.apple.com/HT209520",
"https://support.apple.com/HT209521"
] | [
"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.0:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*... | Apple iOS and macOS Group Facetime Vulnerability | 2021-11-03 | Apple iOS and macOS Group FaceTime contains an unspecified vulnerability where the call initiator can cause the recipient's Apple device to answer unknowingly or without user interaction. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
6.8 | CWE-502 | 2022-04-15 | CVE-2019-6340 | Core | 2019-02-21T21:29:00 | Drupal | [
"http://www.securityfocus.com/bid/107106",
"https://www.drupal.org/sa-core-2019-003",
"https://www.exploit-db.com/exploits/46452/",
"https://www.exploit-db.com/exploits/46459/",
"https://www.exploit-db.com/exploits/46510/",
"https://www.synology.com/security/advisory/Synology_SA_19_09"
] | [
"cpe:2.3:a:drupal:drupal:8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.5.0:-:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.5.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:... | Drupal Core Remote Code Execution Vulnerability | 2022-03-25 | In Drupal Core, some field types do not properly sanitize data from non-form sources. This can lead to arbitrary PHP code execution in some cases. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
7.5 | CWE-863 | 2022-06-22 | CVE-2019-7192 | Photo Station | 2019-12-05T17:15:00 | QNAP | [
"https://www.qnap.com/zh-tw/security-advisory/nas-201911-25",
"http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html"
] | [
"cpe:2.3:a:qnap:photo_station:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qnap:photo_station:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qnap:photo_station:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qnap:photo_station:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qnap:photo_station:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qnap:photo_station:5.2.5:*:*:*:*:*:... | QNAP Photo Station Improper Access Control Vulnerability | 2022-06-08 | QNAP NAS devices running Photo Station contain an improper access control vulnerability allowing remote attackers to gain unauthorized access to the system. | Apply updates per vendor instructions. | 2022-04-22T19:59:00 |
10 | CWE-20 | 2022-06-22 | CVE-2019-7193 | QTS | 2019-12-05T17:15:00 | QNAP | [
"http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html",
"https://www.qnap.com/zh-tw/security-advisory/nas-201911-25"
] | [
"cpe:2.3:o:qnap:qts:4.3.6.0895:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.3.6.0907:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.3.6.0923:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.3.6.0944:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.3.6.0959:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.3.6.0979:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.... | QNAP QTS Improper Input Validation Vulnerability | 2022-06-08 | QNAP QTS contains an improper input validation vulnerability allowing remote attackers to inject code on the system. | Apply updates per vendor instructions. | 2020-05-28T18:15:00 |
7.5 | CWE-22 | 2022-06-22 | CVE-2019-7194 | Photo Station | 2019-12-05T17:15:00 | QNAP | [
"https://www.qnap.com/zh-tw/security-advisory/nas-201911-25",
"http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html"
] | [
"cpe:2.3:a:qnap:photo_station:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qnap:photo_station:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qnap:photo_station:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qnap:photo_station:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qnap:photo_station:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qnap:photo_station:5.2.5:*:*:*:*:*:... | QNAP Photo Station Path Traversal Vulnerability | 2022-06-08 | QNAP devices running Photo Station contain an external control of file name or path vulnerability allowing remote attackers to access or modify system files. | Apply updates per vendor instructions. | 2022-04-22T19:59:00 |
7.5 | CWE-22 | 2022-06-22 | CVE-2019-7195 | Photo Station | 2019-12-05T17:15:00 | QNAP | [
"https://www.qnap.com/zh-tw/security-advisory/nas-201911-25",
"http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html"
] | [
"cpe:2.3:a:qnap:photo_station:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qnap:photo_station:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qnap:photo_station:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qnap:photo_station:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qnap:photo_station:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qnap:photo_station:5.2.5:*:*:*:*:*:... | QNAP Photo Station Path Traversal Vulnerability | 2022-06-08 | QNAP devices running Photo Station contain an external control of file name or path vulnerability allowing remote attackers to access or modify system files. | Apply updates per vendor instructions. | 2022-04-22T19:59:00 |
7.5 | NVD-CWE-noinfo | 2022-06-10 | CVE-2019-7238 | Nexus Repository Manager | 2019-03-21T17:29:00 | Sonatype | [
"https://support.sonatype.com/hc/en-us/articles/360017310793-CVE-2019-7238-Nexus-Repository-Manager-3-Missing-Access-Controls-and-Remote-Code-Execution-February-5th-2019"
] | [
"cpe:2.3:a:sonatype:nexus:2.0.4:1:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:... | Sonatype Nexus Repository Manager Incorrect Access Control Vulnerability | 2021-12-10 | Sonatype Nexus Repository Manager before 3.15.0 has an incorrect access control vulnerability. Exploitation allows for remote code execution. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
10 | CWE-78 | 2024-04-15 | CVE-2019-7256 | Linear eMerge E3-Series | 2019-07-02T19:15:00 | Nice | [
"https://applied-risk.com/labs/advisories",
"https://www.applied-risk.com/resources/ar-2019-005",
"http://packetstormsecurity.com/files/155255/Linear-eMerge-E3-1.00-06-card_scan.php-Command-Injection.html",
"http://packetstormsecurity.com/files/155256/Linear-eMerge-E3-1.00-06-card_scan_decoder.php-Command-Inj... | [
"cpe:2.3:o:nortekcontrol:linear_emerge_essential_firmware:1.00-06:*:*:*:*:*:*:*",
"cpe:2.3:o:nortekcontrol:linear_emerge_elite_firmware:1.00-06:*:*:*:*:*:*:*"
] | Nice Linear eMerge E3-Series OS Command Injection Vulnerability | 2024-03-25 | Nice Linear eMerge E3-Series contains an OS command injection vulnerability that allows an attacker to conduct remote code execution. | Contact the vendor for guidance on remediating firmware, per their advisory. | 2024-05-23T17:58:00 |
6.8 | CWE-787 | 2022-06-13 | CVE-2019-7286 | Multiple Products | 2019-12-18T18:15:00 | Apple | [
"https://support.apple.com/HT209520",
"https://support.apple.com/HT209521",
"https://support.apple.com/HT209601",
"https://support.apple.com/HT209602"
] | [
"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.0:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*... | Apple Multiple Products Memory Corruption Vulnerability | 2022-05-23 | Apple iOS, macOS, watchOS, and tvOS contain a memory corruption vulnerability that could allow for privilege escalation. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
9.3 | CWE-787 | 2022-06-13 | CVE-2019-7287 | iOS | 2019-12-18T18:15:00 | Apple | [
"https://support.apple.com/HT209520"
] | [
"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.0:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*... | Apple iOS Memory Corruption Vulnerability | 2022-05-23 | Apple iOS contains a memory corruption vulnerability which could allow an attacker to perform remote code execution. | Apply updates per vendor instructions. | 2020-08-24T17:37:00 |
5 | CWE-89 | 2022-05-03 | CVE-2019-7481 | SMA100 | 2019-12-17T23:15:00 | SonicWall | [
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0016"
] | [
"cpe:2.3:o:sonicwall:sma_100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sma_100_firmware:9.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sma_100_firmware:9.0.0.3:*:*:*:*:*:*:*"
] | SonicWall SMA100 SQL Injection Vulnerability | 2021-11-03 | SonicWall SMA100 contains a SQL injection vulnerability allowing an unauthenticated user to gain read-only access to unauthorized resources. | Apply updates per vendor instructions. | 2021-09-14T11:50:00 |
5 | CWE-22 | 2022-04-18 | CVE-2019-7483 | SMA100 | 2019-12-19T01:15:00 | SonicWall | [
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0018"
] | [
"cpe:2.3:o:sonicwall:sma_100_firmware:*:*:*:*:*:*:*:*"
] | SonicWall SMA100 Directory Traversal Vulnerability | 2022-03-28 | In SonicWall SMA100, an unauthenticated Directory Traversal vulnerability in the handleWAFRedirect CGI allows the user to test for the presence of a file on the server. | Apply updates per vendor instructions. | 2019-12-31T20:25:00 |
10 | CWE-94 | 2022-07-10 | CVE-2019-7609 | Kibana | 2019-03-25T19:29:00 | Elastic | [
"https://www.elastic.co/community/security",
"https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077",
"https://access.redhat.com/errata/RHSA-2019:2860",
"https://access.redhat.com/errata/RHBA-2019:2824",
"http://packetstormsecurity.com/files/174569/Kibana-Timelion-Prototype-Poll... | [
"cpe:2.3:a:elastic:kibana:-:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:kibana:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:kibana:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:kibana:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:kibana:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:kibana:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:k... | Kibana Arbitrary Code Execution | 2022-01-10 | Kibana contain an arbitrary code execution flaw in the Timelion visualizer. | Apply updates per vendor instructions. | 2023-09-08T23:15:00 |
4 | CWE-434 | 2022-05-03 | CVE-2019-8394 | ManageEngine | 2019-02-17T04:29:00 | Zoho | [
"http://www.securityfocus.com/bid/107129",
"https://www.exploit-db.com/exploits/46413/",
"https://www.manageengine.com/products/service-desk/readme.html"
] | [
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:8.2:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:8.2:8201:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:8.2:8202:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:8.2:8203:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp... | Zoho ManageEngine ServiceDesk Plus (SDP) File Upload Vulnerability | 2021-11-03 | Zoho ManageEngine ServiceDesk Plus (SDP) contains an unspecified vulnerability that allows remote users to upload files via login page customization. | Apply updates per vendor instructions. | 2019-02-26T15:57:00 |
9.3 | CWE-843 | 2022-05-25 | CVE-2019-8506 | Multiple Products | 2019-12-18T18:15:00 | Apple | [
"https://support.apple.com/HT209605",
"https://support.apple.com/HT209604",
"https://support.apple.com/HT209601",
"https://support.apple.com/HT209603",
"https://support.apple.com/HT209599",
"https://support.apple.com/HT209602"
] | [
"cpe:2.3:a:apple:icloud:5.2:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:icloud:6.1.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:icloud:6.2:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:icloud:7.6:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:icloud:7.7:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:icloud:7.8.1:*:*:*:*:windows:*:*",
... | Apple Multiple Products Type Confusion Vulnerability | 2022-05-04 | A type confusion issue affecting multiple Apple products allows processing of maliciously crafted web content, leading to arbitrary code execution. | Apply updates per vendor instructions. | 2021-05-18T12:59:00 |
7.2 | CWE-416 | 2023-05-08 | CVE-2019-8526 | macOS | 2019-12-18T18:15:00 | Apple | [
"https://support.apple.com/HT209600"
] | [
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:... | Apple macOS Use-After-Free Vulnerability | 2023-04-17 | Apple macOS contains a use-after-free vulnerability that could allow for privilege escalation. | Apply updates per vendor instructions. | 2019-12-20T23:00:00 |
9.3 | CWE-416 | 2022-07-18 | CVE-2019-8605 | Multiple Products | 2019-12-18T18:15:00 | Apple | [
"https://support.apple.com/HT210118",
"https://support.apple.com/HT210119",
"https://support.apple.com/HT210120",
"https://support.apple.com/HT210122"
] | [
"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.0:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*... | Apple Multiple Products Use-After-Free Vulnerability | 2022-06-27 | A use-after-free vulnerability in Apple iOS, macOS, tvOS, and watchOS could allow a malicious application to execute code with system privileges. | Apply updates per vendor instructions. | 2019-12-20T17:47:00 |
null | CWE-119 | 2022-06-13 | CVE-2019-8720 | WebKitGTK | 2023-03-06T23:15:00 | WebKitGTK | [
"https://webkitgtk.org/security/WSA-2019-0005.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=1876611"
] | [
"cpe:2.3:a:webkitgtk:webkitgtk:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webkitgtk:webkitgtk:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webkitgtk:webkitgtk:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webkitgtk:webkitgtk:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webkitgtk:webkitgtk:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webkitgtk:webkitgtk:1.1.7:*:*:... | WebKitGTK Memory Corruption Vulnerability | 2022-05-23 | WebKitGTK contains a memory corruption vulnerability which can allow an attacker to perform remote code execution. | Apply updates per vendor instructions. | 2023-03-11T02:53:00 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.