Vulnerability Summary for the Week of June 3, 2019

Released
Jun 10, 2019
Document ID
SB19-161

The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. NVD is sponsored by CISA. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High: vulnerabilities with a CVSS base score of 7.0–10.0
  • Medium: vulnerabilities with a CVSS base score of 4.0–6.9
  • Low: vulnerabilities with a CVSS base score of 0.0–3.9

Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis. 

The NCCIC Weekly Vulnerability Summary Bulletin is created using information from the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD). In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

 

High Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
ais -- logistic_softwareSQL Injection in Advanced InfoData Systems (AIS) ESEL-Server 67 (which is the backend for the AIS logistics mobile app) allows an anonymous attacker to execute arbitrary code in the context of the user of the MSSQL database. The default user for the database is the 'sa' user.2019-05-317.5CVE-2019-10123
MISC
MISC
apcupsd -- apcupsdApcupsd 0.3.91_5, as used in pfSense through 2.4.4-RELEASE-p3 and other products, has an Arbitrary Command Execution issue in apcupsd_status.php.2019-06-027.5CVE-2019-12585
MISC
MISC
MISC
atlassian -- bitbucketAtlassian Bitbucket Data Center licensed instances starting with version 5.13.0 before 5.13.6 (the fixed version for 5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from 5.15.0 before 5.15.3 (fixed version for 5.15.x), from 5.16.0 before 5.16.3 (fixed version for 5.16.x), from 6.0.0 before 6.0.3 (fixed version for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x) allow remote attackers who have admin permissions to achieve remote code execution on a Bitbucket server instance via path traversal through the Data Center migration tool.2019-06-039.0CVE-2019-3397
MISC
atlassian -- crowdAtlassian Crowd and Crowd Data Center had the pdkinstall development plugin incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x), from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.2019-06-037.5CVE-2019-11580
BID
MISC
aubio -- aubioaubio v0.4.0 to v0.4.8 has a Buffer Overflow (issue 1 of 3).2019-06-077.5CVE-2018-19800
MISC
cyrus -- imapThe CalDAV feature in httpd in Cyrus IMAP 2.5.x through 2.5.12 and 3.0.x through 3.0.9 allows remote attackers to execute arbitrary code via a crafted HTTP PUT operation for an event with a long iCalendar property name.2019-06-037.5CVE-2019-11356
FEDORA
FEDORA
BUGTRAQ
MISC
MISC
MISC
MISC
DEBIAN
exim -- eximA flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.2019-06-057.5CVE-2019-10149
SUSE
MISC
MLIST
MLIST
MLIST
MLIST
BID
CONFIRM
BUGTRAQ
GENTOO
UBUNTU
DEBIAN
CONFIRM
facebook -- osqueryIn some configurations an attacker can inject a new executable path into the extensions.load file for osquery and hard link a parent folder of a malicious binary to a folder with known 'safe' permissions. Under those circumstances osquery will load said malicious executable with SYSTEM permissions. The solution is to migrate installations to the 'Program Files' directory on Windows which restricts unprivileged write access. This issue affects osquery prior to v3.4.0.2019-06-039.3CVE-2019-3567
MISC
ffmpeg -- ffmpegaa_read_header in libavformat/aadec.c in FFmpeg before 3.2.14 does not check for sscanf failure and consequently allows use of uninitialized variables.2019-06-047.5CVE-2019-12730
MISC
MISC
glpi_dashboard_project -- glpi_dashboardIncorrect access control was discovered in the stdonato Dashboard plugin through 0.9.7 for GLPI, affecting df.php, issue.php, load.php, mem.php, traf.php, and uptime.php in front/sh.2019-06-027.5CVE-2019-12530
MISC
godotengine -- godotIn Godot through 3.1, remote code execution is possible due to the deserialization policy not being applied correctly.2019-05-317.5CVE-2019-10069
MISC
MISC
hoteldruid -- hoteldruidHotelDruid before v2.3.1 has SQL Injection via the /visualizza_tabelle.php anno parameter.2019-06-077.5CVE-2019-9086
MISC
MISC
hoteldruid -- hoteldruidHotelDruid before v2.3.1 has SQL Injection via the /tab_tariffe.php numtariffa1 parameter.2019-06-077.5CVE-2019-9087
MISC
MISC
hp -- integrated_lights-out_4_firmwareA remote cross site scripting vulnerability was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than v2.61b for Gen9 servers and Integrated Lights-Out 5 (iLO 5) for Gen10 Servers earlier than version v1.39.2019-06-057.6CVE-2019-11982
CONFIRM
hp -- integrated_lights-out_4_firmwareA remote buffer overflow vulnerability was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than v2.61b for Gen9 servers and Integrated Lights-Out 5 (iLO 5) for Gen10 Servers earlier than version v1.39.2019-06-058.3CVE-2019-11983
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-0510.0CVE-2018-7121
CONFIRM
hp -- intelligent_management_centerA remote denial of service vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-057.8CVE-2018-7123
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-0510.0CVE-2018-7124
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11941
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11942
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11943
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-0510.0CVE-2019-11944
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-0510.0CVE-2019-11945
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11947
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11948
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-0510.0CVE-2019-11949
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11950
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11951
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11952
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11953
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11954
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11955
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11956
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.3CVE-2019-11957
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11958
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11959
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11960
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11961
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11962
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11963
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11964
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11965
CONFIRM
hp -- intelligent_management_centerA remote privilege escalation vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11966
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11967
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11968
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11969
CONFIRM
hp -- intelligent_management_centerA SQL injection code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11970
CONFIRM
hp -- intelligent_management_centerA SQL injection code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11971
CONFIRM
hp -- intelligent_management_centerA SQL injection code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11972
CONFIRM
hp -- intelligent_management_centerA SQL injection code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11973
CONFIRM
hp -- intelligent_management_centerA SQL injection code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11974
CONFIRM
hp -- intelligent_management_centerA SQL injection code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11975
CONFIRM
hp -- intelligent_management_centerA SQL injection code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11976
CONFIRM
hp -- intelligent_management_centerA SQL injection code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11977
CONFIRM
hp -- intelligent_management_centerA SQL injection code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11978
CONFIRM
hp -- intelligent_management_centerA SQL injection code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11979
CONFIRM
hp -- intelligent_management_centerA remote code exection vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11980
CONFIRM
hp -- intelligent_management_centerA SQL injection code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11984
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11985
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-11986
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5338
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5339
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5340
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5341
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5342
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5343
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5344
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5345
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5346
CONFIRM
hp -- intelligent_management_centerA remote authentication bypass vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-0510.0CVE-2019-5347
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5348
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5349
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5350
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5351
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-0510.0CVE-2019-5352
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5353
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5354
CONFIRM
hp -- intelligent_management_centerA remote denial of service vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-057.8CVE-2019-5355
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-0510.0CVE-2019-5356
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5357
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-0510.0CVE-2019-5358
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5359
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5360
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5361
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5362
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5363
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5364
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5365
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5366
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-0510.0CVE-2019-5367
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5368
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5369
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5370
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5371
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5372
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5373
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5374
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5375
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5376
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5377
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5378
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5379
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5380
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5381
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5382
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5383
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5384
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5385
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5386
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-0510.0CVE-2019-5387
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5388
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-059.0CVE-2019-5389
CONFIRM
hp -- intelligent_management_centerA remote command injection vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-0510.0CVE-2019-5390
CONFIRM
hp -- intelligent_management_centerA stack buffer overflow vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-0510.0CVE-2019-5391
CONFIRM
huawei -- s12700_firmwareSome Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109)2019-06-047.8CVE-2019-5285
CONFIRM
ivanti -- landesk_management_suiteOpen directories in Ivanti LANDESK Management Suite (LDMS, aka Endpoint Manager) 10.0.1.168 Service Update 5 may lead to remote information disclosure and arbitrary code execution.2019-06-037.5CVE-2019-12375
MISC
ivanti -- landesk_management_suiteA vulnerable upl/async_upload.asp web API endpoint in Ivanti LANDESK Management Suite (LDMS, aka Endpoint Manager) 10.0.1.168 Service Update 5 allows arbitrary file upload, which may lead to arbitrary remote code execution.2019-06-037.5CVE-2019-12377
MISC
MISC
jector -- fm-k75_firmwareJector Smart TV FM-K75 devices allow remote code execution because there is an adb open port with root permission.2019-05-3110.0CVE-2019-9871
MISC
MISC
kromtech -- mackeeperKromtech MacKeeper 3.20.4 suffers from a root privilege escalation vulnerability through its `com.mackeeper.AdwareAnalyzer.AdwareAnalyzerPrivilegedHelper` component. The AdwareAnalzyerPrivilegedHelper tool implements an XPC service that allows an unprivileged application to connect and execute shell scripts as the root user.2019-06-0510.0CVE-2018-10171
MISC
linksys -- wrt1900acs_firmwareAn issue was discovered on Linksys WRT1900ACS 1.0.3.187766 devices. A lack of encryption in how the user login cookie (admin-auth) is stored on a victim's computer results in the admin password being discoverable by a local attacker, and usable to gain administrative access to the victim's router. The admin password is stored in base64 cleartext in an "admin-auth" cookie. An attacker sniffing the network at the time of login could acquire the router's admin password. Alternatively, gaining physical access to the victim's computer soon after an administrative login could result in compromise.2019-06-067.2CVE-2019-7311
MISC
MISC
linux -- linux_kernelAn issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop->name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).2019-06-037.8CVE-2019-12614
BID
MISC
MISC
linux -- linux_kernelAn issue was discovered in get_vdev_port_node_info in arch/sparc/kernel/mdesc.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup_const of node_info->vdev_port.name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).2019-06-037.8CVE-2019-12615
BID
MISC
MISC
linux -- linux_kernelA flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.2019-06-038.3CVE-2019-3846
CONFIRM
FEDORA
FEDORA
MISC
microfocus -- service_managerRemote unauthorized command execution and unauthorized disclosure of information in Micro Focus Service Manager, versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61. This vulnerability could allow Remote unauthorized command execution and unauthorized disclosure of information.2019-06-039.0CVE-2019-11646
MISC
northern -- cfengineNorthern.tech CFEngine Enterprise 3.12.1 has Insecure Permissions.2019-06-069.0CVE-2019-9929
MISC
MISC
orpak -- siteomatThe Orpak SiteOmat OrCU component is vulnerable to code injection, for all versions prior to 2017-09-25, due to a search query that uses a direct shell command. By tampering with the request, an attacker is able to run shell commands and receive valid output from the device.2019-06-0310.0CVE-2017-14853
BID
MISC
MISC
orpak -- siteomatA stack buffer overflow exists in one of the Orpak SiteOmat CGI components, allowing for remote code execution. The vulnerability affects all versions prior to 2017-09-25.2019-06-037.5CVE-2017-14854
MISC
BID
MISC
phpmyadmin -- phpmyadminAn issue was discovered in phpMyAdmin before 4.9.0.1. A vulnerability was reported where a specially crafted database name can be used to trigger an SQL injection attack through the designer feature.2019-06-057.5CVE-2019-11768
BID
CONFIRM
primasystems -- flexairPrima Systems FlexAir devices have Hard-coded Credentials.2019-06-057.5CVE-2019-7672
MISC
MISC
MISC
primasystems -- flexairOn Prima Systems FlexAir devices through 2.4.9api3, an authenticated user can upload Python (.py) scripts and execute arbitrary code with root privileges.2019-06-059.0CVE-2019-9189
MISC
MISC
MISC
pydio -- pydioThe ImageMagick plugin that is installed by default in Pydio through 8.2.2 does not perform the appropriate validation and sanitization of user supplied input in the plugin's configuration options, allowing arbitrary shell commands to be entered that result in command execution on the underlying operating system, with the privileges of the local user running the web server. The attacker must be authenticated into the application with an administrator user account in order to be able to edit the affected plugin configuration.2019-05-319.0CVE-2019-10048
MISC
pydio -- pydioAn issue was discovered in proxy.php in pydio-core in Pydio through 8.2.2. Through an unauthenticated request, it possible to evaluate malicious PHP code by placing it on the fourth line of a .php file, as demonstrated by a PoC.php created by the guest account, with execution via a proxy.php?hash=../../../../../var/lib/pydio/data/personal/guest/PoC.php request. This is related to plugins/action.share/src/Store/ShareStore.php.2019-06-057.5CVE-2019-9642
MISC
CONFIRM
qemu -- qemuIn QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.2019-05-317.5CVE-2018-20815
MISC
rakuten -- viberA vulnerability in Viber before 10.7.0 for Desktop (Windows) could allow an attacker to execute arbitrary commands on a targeted system. This vulnerability is due to unsafe search paths used by the application URI. An attacker could exploit this vulnerability by convincing a targeted user to follow a malicious link. Successful exploitation could cause the application to load libraries from the directory targeted by the URI link. The attacker could use this behavior to execute arbitrary commands on the system with the privileges of the targeted user, if the attacker can place a crafted library in a directory that is accessible to the vulnerable system.2019-06-029.3CVE-2019-12569
MISC
rubygems -- rubygemsA Directory Traversal issue was discovered in RubyGems 2.7.6 and later through 3.0.2. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (/tmp, /usr, etc.), this could likely lead to data loss or an unusable system.2019-06-068.8CVE-2019-8320
CONFIRM
MISC
saet -- webappThe WebApp v04.68 in the supervisor on SAET Impianti Speciali TEBE Small 05.01 build 1137 devices allows remote attackers to execute or include local .php files, as demonstrated by menu=php://filter/convert.base64-encode/resource=index.php to read index.php.2019-05-317.5CVE-2019-9106
MISC
MISC
sitecore -- cmsDeserialization of Untrusted Data in the Sitecore.Security.AntiCSRF (aka anti CSRF) module in Sitecore CMS 7.0 to 7.2 and Sitecore XP 7.5 to 8.2 allows an unauthenticated attacker to execute arbitrary code by sending a serialized .NET object in the HTTP POST parameter __CSRFTOKEN.2019-05-317.5CVE-2019-9874
MISC
MISC
MISC
sweetscape -- 010_editorIn SweetScape 010 Editor 9.0.1, improper validation of arguments in the internal implementation of the StrCat function (provided by the scripting engine) allows an attacker to overwrite arbitrary memory, which could lead to code execution.2019-06-057.5CVE-2019-12553
MISC
CONFIRM
titanhq -- spamtitanIn TitanHQ SpamTitan through 7.03, a vulnerability exists in the spam rule update function. Updates are downloaded over HTTP, including scripts which are subsequently executed with root permissions. An attacker with a privileged network position is trivially able to inject arbitrary commands.2019-06-058.5CVE-2019-6800
MISC
CONFIRM
tldp -- advanced_bash-scripting_guideThe function getopt_simple as described in Advanced Bash Scripting Guide (ISBN 978-1435752184) allows privilege escalation and execution of commands when used in a shell script called, for example, via sudo.2019-05-3110.0CVE-2019-9891
MISC
ui -- aircam_firmwareOn Ubiquiti airCam 3.1.4 devices, a Denial of Service vulnerability exists in the RTSP Service provided by the ubnt-streamer binary. The issue can be triggered via malformed RTSP requests that lead to an invalid memory read. To exploit the vulnerability, an attacker must craft an RTSP request with a large number of headers.2019-06-047.8CVE-2019-12727
MISC
vim -- vimgetchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.2019-06-059.3CVE-2019-12735
MISC
MISC
MISC
MISC
MISC
FEDORA
zohocorp -- manageengine_netflow_analyzerA SQL injection vulnerability in /client/api/json/v2/nfareports/compareReport in Zoho ManageEngine NetFlow Analyzer 12.3 allows attackers to execute arbitrary SQL commands via the DeviceID parameter.2019-06-057.5CVE-2019-12196
BID
MISC
zyxel -- p-660hn-t1_firmwareThe rpWLANRedirect.asp ASP page is accessible without authentication on ZyXEL P-660HN-T1 V2 (2.00(AAKK.3)) devices. After accessing the page, the admin user's password can be obtained by viewing the HTML source code, and the interface of the modem can be accessed as admin.2019-05-3110.0CVE-2019-6725
BUGTRAQ

Back to top

 

Medium Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
apcupsd -- apcupsdApcupsd 0.3.91_5, as used in pfSense through 2.4.4-RELEASE-p3 and other products, has an XSS issue in apcupsd_status.php.2019-06-024.3CVE-2019-12584
MISC
MISC
MISC
atutor -- atutorATutor 2.2.4 allows Arbitrary File Upload and Directory Traversal, resulting in remote code execution via a ".." pathname in a ZIP archive to the mods/_core/languages/language_import.php (aka Import New Language) or mods/_standard/patcher/index_admin.php (aka Patcher) component.2019-06-036.8CVE-2019-12169
MISC
MISC
MISC
aubio -- aubioaubio v0.4.0 to v0.4.8 has a NULL pointer dereference (issue 1 of 6).2019-06-075.0CVE-2018-19801
MISC
aubio -- aubioaubio v0.4.0 to v0.4.8 has a Buffer Overflow (issue 2 of 3).2019-06-075.0CVE-2018-19802
MISC
bitdefender -- safepayThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender SafePay 23.0.10.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of tiscript. When processing the System.Exec method the application does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7234.2019-06-036.8CVE-2019-6736
CONFIRM
MISC
bitdefender -- safepayThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender SafePay 23.0.10.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of TIScript. The issue lies in the handling of the openFile method, which allows for an arbitrary file write with attacker controlled data. An attacker can leverage this vulnerability execute code in the context of the current process. Was ZDI-CAN-7247.2019-06-036.8CVE-2019-6737
CONFIRM
MISC
bitdefender -- safepayThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender SafePay 23.0.10.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of TIScript. When processing the launch method the application does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability execute code in the context of the current process. Was ZDI-CAN-7250.2019-06-036.8CVE-2019-6738
CONFIRM
MISC
bludit -- bluditBludit before 3.9.0 allows remote code execution for an authenticated user by uploading a php file while changing the logo through /admin/ajax/upload-logo.2019-06-036.5CVE-2019-12548
CONFIRM
MISC
CONFIRM
bludit -- bluditBludit prior to 3.9.1 allows a non-privileged user to change the password of any account, including admin. This occurs because of bl-kernel/admin/controllers/user-password.php Insecure Direct Object Reference (a modified username POST parameter).2019-06-056.5CVE-2019-12742
MISC
MISC
cisco -- enterprise_chat_and_emailA vulnerability in the web-based management interface of Cisco Enterprise Chat and Email (ECE) Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web interface or allow the attacker to access sensitive browser-based information.2019-06-054.3CVE-2019-1870
BID
CISCO
cisco -- industrial_network_directorA vulnerability in the web-based management interface of Cisco Industrial Network Director (IND) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to use a web browser and the privileges of the user to perform arbitrary actions on an affected device. For more information about CSRF attacks and potential mitigations, see Understanding Cross-Site Request Forgery Threat Vectors.2019-06-056.8CVE-2019-1881
BID
CISCO
cisco -- ios_xr_firmwareA vulnerability in the Secure Shell (SSH) authentication function of Cisco IOS XR Software could allow an authenticated, remote attacker to successfully log in to an affected device using two distinct usernames. The vulnerability is due to a logic error that may occur when certain sequences of actions are processed during an SSH login event on the affected device. An attacker could exploit this vulnerability by initiating an SSH session to the device with a specific sequence that presents the two usernames. A successful exploit could result in logging data misrepresentation, user enumeration, or, in certain circumstances, a command authorization bypass. See the Details section for more information.2019-06-055.5CVE-2019-1842
BID
CISCO
cisco -- telepresence_video_communication_serverA vulnerability in the authentication service of the Cisco Unified Communications Manager IM and Presence (Unified CM IM&P) Service, Cisco TelePresence Video Communication Server (VCS), and Cisco Expressway Series could allow an unauthenticated, remote attacker to cause a service outage for users attempting to authenticate, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient controls for specific memory operations. An attacker could exploit this vulnerability by sending a malformed Extensible Messaging and Presence Protocol (XMPP) authentication request to an affected system. A successful exploit could allow the attacker to cause an unexpected restart of the authentication service, preventing users from successfully authenticating. Exploitation of this vulnerability does not impact users who were authenticated prior to an attack.2019-06-055.0CVE-2019-1845
BID
CISCO
cisco -- telepresence_video_communication_serverA vulnerability in Cisco TelePresence Video Communication Server (VCS) and Cisco Expressway Series software could allow an unauthenticated, remote attacker to cause an affected system to send arbitrary network requests. The vulnerability is due to improper restrictions on network services in the affected software. An attacker could exploit this vulnerability by sending malicious requests to the affected system. A successful exploit could allow the attacker to send arbitrary network requests sourced from the affected system.2019-06-055.0CVE-2019-1872
BID
CISCO
cisco -- webex_meetings_serverA vulnerability in the web-based management interface of Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to access sensitive system information. The vulnerability is due to improper access control to files within the web-based management interface. An attacker could exploit this vulnerability by sending a malicious request to an affected device. A successful exploit could allow the attacker to access sensitive system information.2019-06-055.0CVE-2019-1868
BID
CISCO
citrix -- xenmobile_serverAn Incorrect Access Control vulnerability has been identified in Citrix XenMobile Server 10.8.0 before Rolling Patch 6 and 10.9.0 before Rolling Patch 3. An attacker can impersonate and take actions on behalf of any Mobile Application Management (MAM) enrolled device.2019-06-056.4CVE-2018-18571
BID
CONFIRM
cloudera -- cloudera_managerThis CVE relates to an unspecified cross site scripting vulnerability in Cloudera Manager.2019-06-074.3CVE-2018-5798
MISC
CONFIRM
dameware -- remote_mini_controlDameware Remote Mini Control version 12.1.0.34 and prior contains an unauthenticated remote buffer over-read due to the server not properly validating CltDHPubKeyLen during key negotiation, which could crash the application or leak sensitive information.2019-06-075.8CVE-2019-3956
MISC
dameware -- remote_mini_controlDameware Remote Mini Control version 12.1.0.34 and prior contains an unauthenticated remote buffer over-read due to the server not properly validating RsaSignatureLen during key negotiation, which could crash the application or leak sensitive information.2019-06-075.8CVE-2019-3957
MISC
djangoproject -- djangoAn issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link.2019-06-034.3CVE-2019-12308
MLIST
BID
CONFIRM
CONFIRM
CONFIRM
MISC
MISC
MLIST
CONFIRM
douco -- douphpIn DouCo DouPHP v1.5 Release 20190516, remote attackers can view the database backup file via a brute-force guessing approach for data/backup/DyyyymmddThhmmss.sql filenames.2019-06-025.0CVE-2019-12564
MISC
eficode -- influxdbJenkins InfluxDB Plugin 1.21 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.2019-05-314.0CVE-2019-10329
MLIST
BID
MISC
evernote -- evernoteEvernote 7.9 on macOS allows attackers to execute arbitrary programs by embedding a reference to a local executable file such as the /Applications/Calculator.app/Contents/MacOS/Calculator file.2019-05-314.4CVE-2019-10038
MISC
MISC
MISC
exagrid -- backup_appliance_firmwareExaGrid appliances with firmware version v4.8.1.1044.P50 have a /monitor/data/Upgrade/ directory traversal vulnerability, which allows remote attackers to view and retrieve verbose logging information. Files within this directory were observed to contain sensitive run-time information, including Base64 encoded 'support' credentials, leading to administrative access of the device.2019-06-035.0CVE-2019-12310
MISC
MISC
firejail_project -- firejailIn Firejail before 0.9.60, seccomp filters are writable inside the jail, leading to a lack of intended seccomp restrictions for a process that is joined to the jail after a filter has been modified by an attacker.2019-06-024.6CVE-2019-12589
MISC
MISC
MISC
fortinet -- fortiosAn Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests.2019-06-045.0CVE-2018-13379
CONFIRM
fortinet -- fortiosA Cross-site Scripting (XSS) vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4 and below versions under SSL VPN web portal allows attacker to execute unauthorized malicious script code via the error or message handling parameters.2019-06-044.3CVE-2018-13380
BID
CONFIRM
fortinet -- fortiosA buffer overflow vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4 and below versions under SSL VPN web portal allows a non-authenticated attacker to perform a Denial-of-service attack via special craft message payloads.2019-06-045.0CVE-2018-13381
BID
CONFIRM
fortinet -- fortiosAn Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests.2019-06-045.0CVE-2018-13382
CONFIRM
fortinet -- fortiosA Host Header Redirection vulnerability in Fortinet FortiOS all versions below 6.0.5 under SSL VPN web portal allows a remote attacker to potentially poison HTTP cache and subsequently redirect SSL VPN web portal users to arbitrary web domains.2019-06-045.8CVE-2018-13384
CONFIRM
fortinet -- fortiosA reflected Cross-Site-Scripting (XSS) vulnerability in Fortinet FortiOS 5.2.0 to 6.0.4 under SSL VPN web portal may allow an attacker to execute unauthorized malicious script code via the "param" parameter of the error process HTTP requests.2019-06-044.3CVE-2019-5586
BID
CONFIRM
fortinet -- fortiosLack of root file system integrity checking in Fortinet FortiOS VM application images all versions below 6.0.5 may allow attacker to implant malicious programs into the installing image by reassembling the image through specific methods.2019-06-044.0CVE-2019-5587
BID
CONFIRM
fortinet -- fortiosA reflected Cross-Site-Scripting (XSS) vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4 under SSL VPN web portal may allow an attacker to execute unauthorized malicious script code via the "err" parameter of the error process HTTP requests.2019-06-044.3CVE-2019-5588
BID
CONFIRM
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit PhantomPDF 9.3.10826. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF documents. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7620.2019-06-034.3CVE-2019-6752
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.3.0.10826. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the Stuff method. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7561.2019-06-034.3CVE-2019-6753
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.3.10826. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the localFileStorage method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7407.2019-06-036.8CVE-2019-6754
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.3.10826. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ConvertToPDF_x86.dll. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7613.2019-06-036.8CVE-2019-6755
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit PhantomPDF 9.4.0.16811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of HTML files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7769.2019-06-034.3CVE-2019-6756
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.16811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ConvertToPDF_x86.dll. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7696.2019-06-036.8CVE-2019-6757
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.4.16811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ConvertToPDF_x86.dll. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7701.2019-06-034.3CVE-2019-6758
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.3.10826. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ConvertToPDF_x86.dll. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7614.2019-06-036.8CVE-2019-6759
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.16811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ConvertToPDF_x86.dll. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7694.2019-06-036.8CVE-2019-6760
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.0.16811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XFA CXFA_FFDocView object. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7777.2019-06-036.8CVE-2019-6761
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of HTML files to PDF. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7844.2019-06-036.8CVE-2019-6762
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the ToggleFormsDesign method of the Foxit.FoxitReader.Ctl ActiveX object. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7874.2019-06-036.8CVE-2019-6763
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of XFA Template objects. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7972.2019-06-036.8CVE-2019-6764
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of HTML files to PDF. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-8170.2019-06-036.8CVE-2019-6765
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method when processing AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8162.2019-06-034.3CVE-2019-6766
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method when processing AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-8163.2019-06-036.8CVE-2019-6767
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method when processing AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-8164.2019-06-036.8CVE-2019-6768
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method when processing AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-8165.2019-06-036.8CVE-2019-6769
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the resetForm method when processing AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8229.2019-06-034.3CVE-2019-6770
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 2019.010.20098. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the value property of a Field object within AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8230.2019-06-034.3CVE-2019-6771
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 2019.010.20098. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method when processing AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8231.2019-06-034.3CVE-2019-6772
MISC
MISC
foxitsoftware -- foxit_readerThis vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the richValue property of a Field object within AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8272.2019-06-034.3CVE-2019-6773
MISC
MISC
foxitsoftware -- foxit_studio_photoThis vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Studio Photo 3.6.6. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of TIF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7634.2019-06-034.3CVE-2019-6746
MISC
MISC
foxitsoftware -- foxit_studio_photoThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Studio Photo 3.6.6. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of EZI files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7636.2019-06-036.8CVE-2019-6747
MISC
MISC
foxitsoftware -- foxit_studio_photoThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Studio Photo 3.6.6. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of EZI files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7637.2019-06-036.8CVE-2019-6748
MISC
MISC
foxitsoftware -- foxit_studio_photoThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Studio Photo 3.6.6. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of EZIX files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7638.2019-06-036.8CVE-2019-6749
MISC
MISC
foxitsoftware -- foxit_studio_photoThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Studio Photo 3.6.6. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of EZI files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7639.2019-06-036.8CVE-2019-6750
MISC
MISC
foxitsoftware -- foxit_studio_photoThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Studio Photo 3.6.6.779. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of JPG files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7632.2019-06-036.8CVE-2019-6751
MISC
MISC
gardener -- gardenerIn Gardener before 0.20.0, incorrect access control in seed clusters allows information disclosure by sending HTTP GET requests from one's own shoot clusters to foreign shoot clusters. This occurs because traffic from shoot to seed via the VPN endpoint is not blocked.2019-06-055.0CVE-2019-12494
MISC
MISC
CONFIRM
gilacms -- gila_cmsGila CMS 1.9.1 has XSS.2019-06-054.3CVE-2019-9647
MISC
MISC
gitea -- giteaJenkins Gitea Plugin 1.1.1 and earlier did not implement trusted revisions, allowing attackers without commit access to the Git repo to change Jenkinsfiles even if Jenkins is configured to consider them to be untrusted.2019-05-315.0CVE-2019-10330
MLIST
BID
MISC
glyphandcog -- xpdfreaderThere is an out-of-bounds read vulnerability in the function FlateStream::getChar() located at Stream.cc in Xpdf 4.01.01. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It might allow an attacker to cause Information Disclosure or a denial of service.2019-06-015.8CVE-2019-12515
MISC
grails -- grailsGrails before 3.3.10 used cleartext HTTP to resolve the SDKMan notification service. NOTE: users' apps were not resolving dependencies over cleartext HTTP.2019-06-046.8CVE-2019-12728
MISC
MISC
grandnode -- grandnodeA Path Traversal vulnerability in Controllers/LetsEncryptController.cs in LetsEncryptController in GrandNode 4.40 allows remote, unauthenticated attackers to retrieve arbitrary files on the web server via specially crafted LetsEncrypt/Index?fileName= HTTP requests. A patch for this issue was made on 2019-05-30 in GrandNode 4.40.2019-06-055.0CVE-2019-12276
MISC
MISC
hp -- intelligent_management_centerA remote disclosure of information vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-055.0CVE-2018-7122
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-056.5CVE-2018-7125
CONFIRM
hp -- intelligent_management_centerA remote credential disclosure vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-056.8CVE-2019-11946
CONFIRM
hp -- intelligent_management_centerA disclosure of information vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-055.0CVE-2019-5392
CONFIRM
hp -- intelligent_management_centerA remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.2019-06-056.8CVE-2019-5393
CONFIRM
huawei -- ar1200-s_firmwareThere is a digital signature verification bypass vulnerability in AR1200, AR1200-S, AR150, AR160, AR200, AR2200, AR2200-S, AR3200, SRG1300, SRG2300 and SRG3300 Huawei routers. The vulnerability is due to the affected software improperly verifying digital signatures for the software image in the affected device. A local attacker with high privilege may exploit the vulnerability to bypass integrity checks for software images and install a malicious software image on the affected device.2019-06-044.6CVE-2019-5300
CONFIRM
ibm -- control_deskIBM Maximo Asset Management 7.6 could allow a an authenticated user to replace a target page with a phishing site which could allow the attacker to obtain highly sensitive information. IBM X-Force ID: 155554.2019-06-054.0CVE-2018-2028
XF
CONFIRM
ibm -- control_deskIBM Maximo Asset Management 7.6 Work Centers' application does not validate file type upon upload, allowing attackers to upload malicious files. IBM X-Force ID: 156565.2019-06-054.0CVE-2019-4056
XF
CONFIRM
ibm -- infosphere_information_serverIBM InfoSphere Information Server 11.7.1 containers are vulnerable to privilege escalation due to an insecurely configured component. IBM X-Force ID: 158975.2019-06-055.4CVE-2019-4185
XF
CONFIRM
icewarp -- mail_serverIceWarp Mail Server through 10.4.4 is prone to a local file inclusion vulnerability via webmail/calendar/minimizer/index.php?style=..%5c directory traversal.2019-06-035.0CVE-2019-12593
MISC
MISC
ikiwiki -- ikiwikiikiwiki before 3.20170111.1 and 3.2018x and 3.2019x before 3.20190226 allows SSRF via the aggregate plugin. The impact also includes reading local files via file: URIs.2019-06-055.0CVE-2019-9187
MISC
istio -- istioIstio 1.1.x through 1.1.6 has Incorrect Access Control.2019-06-055.4CVE-2019-12243
MISC
CONFIRM
ivanti -- landesk_management_suiteImproper access control and open directories in Ivanti LANDESK Management Suite (LDMS, aka Endpoint Manager) 10.0.1.168 Service Update 5 may lead to remote disclosure of administrator passwords.2019-06-035.0CVE-2019-12373
MISC
MISC
ivanti -- landesk_management_suiteA SQL Injection vulnerability exists in Ivanti LANDESK Management Suite (LDMS, aka Endpoint Manager) 10.0.1.168 Service Update 5 due to improper username sanitization in the Basic Authentication implementation in core/provisioning.secure/ProvisioningSecure.asmx in Provisioning.Secure.dll.2019-06-036.8CVE-2019-12374
MISC
MISC
jenkins -- pipeline_maven_integrationAn XML external entities (XXE) vulnerability in Jenkins Pipeline Maven Integration Plugin 1.7.0 and earlier allowed attackers able to control a temporary directory's content on the agent running the Maven build to have Jenkins parse a maliciously crafted XML file that uses external entities for extraction of secrets from the Jenkins master, server-side request forgery, or denial-of-service attacks.2019-05-315.5CVE-2019-10327
MLIST
BID
MISC
jenkins -- pipeline_remote_loaderJenkins Pipeline Remote Loader Plugin 1.4 and earlier provided a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.2019-05-316.5CVE-2019-10328
MLIST
BID
MISC
jenkins -- warnings_next_generationA cross-site request forgery vulnerability in Jenkins Warnings NG Plugin 5.0.0 and earlier allowed attackers to reset warning counts for future builds.2019-05-314.3CVE-2019-10326
MLIST
BID
MISC
jfrog -- artifactoryA cross-site request forgery vulnerability in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.2019-05-314.3CVE-2019-10321
MLIST
BID
MISC
MISC
jfrog -- artifactoryA missing permission check in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.2019-05-314.0CVE-2019-10322
MLIST
BID
MISC
MISC
jfrog -- artifactoryA missing permission check in Jenkins Artifactory Plugin 3.2.3 and earlier in various 'fillCredentialsIdItems' methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.2019-05-314.0CVE-2019-10323
MLIST
BID
MISC
MISC
jfrog -- artifactoryA cross-site request forgery vulnerability in Jenkins Artifactory Plugin 3.2.2 and earlier in ReleaseAction#doSubmit, GradleReleaseApiAction#doStaging, MavenReleaseApiAction#doStaging, and UnifiedPromoteBuildAction#doSubmit allowed attackers to schedule a release build, perform release staging for Gradle and Maven projects, and promote previously staged builds, respectively.2019-05-314.3CVE-2019-10324
MLIST
BID
MISC
malwarebytes -- antimalwareThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Malwarebytes Antimalware 3.6.1.2711. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page. There is an issue with the way the product handles URIs within certain schemes. The product does not warn the user that a dangerous navigation is about to take place. Because special characters in the URI are not sanitized, this could lead to the execution of arbitrary commands. An attacker can leverage this vulnerability to execute code in the context of the current user at medium integrity. Was ZDI-CAN-7162.2019-06-036.8CVE-2019-6739
MISC
mantisbt -- mantisbtAn issue was discovered in MantisBT through 1.3.14, and 2.0.0. Using a crafted request on bug_report_page.php (modifying the 'm_id' parameter), any user with REPORTER access or above is able to view any private issue's details (summary, description, steps to reproduce, additional information) when cloning it. By checking the 'Copy issue notes' and 'Copy attachments' checkboxes and completing the clone operation, this data also becomes public (except private notes).2019-06-064.0CVE-2018-9839
CONFIRM
MISC
marvell -- 88ss1074_firmwareMarvell SSD Controller (88SS1074, 88SS1079, 88SS1080, 88SS1093, 88SS1092, 88SS1095, 88SS9174, 88SS9175, 88SS9187, 88SS9188, 88SS9189, 88SS9190, 88SS1085, 88SS1087, 88SS1090, 88SS1100, 88SS1084, 88SS1088, & 88SS1098) devices allow reprogramming flash memory to bypass the secure boot protection mechanism.2019-06-044.9CVE-2019-10636
CONFIRM
mybb -- mybbMyBB 1.8.19 has XSS in the resetpassword function.2019-06-064.3CVE-2019-3578
MISC
CONFIRM
mybb -- mybbMyBB 1.8.19 allows remote attackers to obtain sensitive information because it discloses the username upon receiving a password-reset request that lacks the code parameter.2019-06-065.0CVE-2019-3579
MISC
CONFIRM
nvidia -- vibrante_linuxNVIDIA Vibrante Linux version 1.1, 2.0, and 2.2 contains a vulnerability in the user space driver in which protection mechanisms are insufficient, may lead to denial of service or information disclosure.2019-06-054.6CVE-2017-6261
MISC
otrs -- otrsAn issue was discovered in Open Ticket Request System (OTRS) 7.x before 7.0.5. An attacker who is logged into OTRS as an agent or a customer user can use the search result screens to disclose information from invalid system entities. Following is the list of affected entities: Custom Pages, FAQ Articles, Service Catalogue Items, ITSM Configuration Items.2019-06-034.0CVE-2019-9753
MISC
parso_project -- parsoA deserialization vulnerability exists in the way parso through 0.4.0 handles grammar parsing from the cache. Cache loading relies on pickle and, provided that an evil pickle can be written to a cache grammar file and that its parsing can be triggered, this flaw leads to Arbitrary Code Execution.2019-06-066.0CVE-2019-12760
MISC
phome -- empirecmsadmin\db\DoSql.php in EmpireCMS through 7.5 allows remote attackers to execute arbitrary PHP code via SQL injection that uses a .php filename in a SELECT INTO OUTFILE statement to admin/admin.php.2019-06-076.5CVE-2018-19462
MISC
MISC
MISC
MISC
phpmyadmin -- phpmyadminAn issue was discovered in phpMyAdmin before 4.9.0. A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken <img> tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific INSERT or DELETE statement) to the victim.2019-06-054.3CVE-2019-12616
BID
MISC
CONFIRM
progress -- fiddlerTelerik Fiddler v5.0.20182.28034 doesn't verify the hash of EnableLoopback.exe before running it, which could lead to code execution or local privilege escalation by replacing the original EnableLoopback.exe.2019-06-036.8CVE-2019-12097
MISC
pulsesecure -- pulse_connect_secureIn Pulse Secure Pulse Connect Secure (PCS) before 8.1R15.1, 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4 and Pulse Policy Secure (PPS) before 5.1R15.1, 5.2 before 5.2R12.1, 5.3 before 5.3R15.1, 5.4 before 5.4R7.1, and 9.0 before 9.0R3.2, an authenticated attacker (via the admin web interface) can exploit Incorrect Access Control to execute arbitrary code on the appliance.2019-06-036.5CVE-2019-11509
MISC
CONFIRM
pydio -- pydioThe "action" get_sess_id in the web application of Pydio through 8.2.2 discloses the session cookie value in the response body, enabling scripts to get access to its value. This identifier can be reused by an attacker to impersonate a user and perform actions on behalf of him/her (if the session is still active).2019-05-316.4CVE-2019-10045
MISC
pydio -- pydioAn unauthenticated attacker can obtain information about the Pydio 8.2.2 configuration including session timeout, libraries, and license information.2019-05-315.0CVE-2019-10046
MISC
pydio -- pydioIt is possible for an attacker with regular user access to the web application of Pydio through 8.2.2 to trick an administrator user into opening a link shared through the application, that in turn opens a shared file that contains JavaScript code (that is executed in the context of the victim user to obtain sensitive information such as session identifiers and perform actions on behalf of him/her).2019-05-314.9CVE-2019-10049
MISC
python -- pyxdgA code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a Category element of a Menu XML document in a .menu file. XDG_CONFIG_DIRS must be set up to trigger xdg.Menu.parse parsing within the directory containing this file. This is due to a lack of sanitization in xdg/Menu.py before an eval call.2019-06-065.1CVE-2019-12761
MISC
MISC
redhat -- openstackAn access-control flaw was found in the Octavia service when the cloud platform was deployed using Red Hat OpenStack Platform Director. An attacker could cause new amphorae to run based on any arbitrary image. This meant that a remote attacker could upload a new amphorae image and, if requested to spawn new amphorae, Octavia would then pick up the compromised image.2019-06-036.8CVE-2019-3895
CONFIRM
redhat -- rktrkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` are given all capabilities during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.2019-06-036.9CVE-2019-10144
CONFIRM
MISC
redhat -- rktrkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` do not have seccomp filtering during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.2019-06-036.9CVE-2019-10145
CONFIRM
MISC
redhat -- rktrkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` are not limited by cgroups during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.2019-06-036.9CVE-2019-10147
CONFIRM
MISC
saet -- webappThe WebApp v04.68 in the supervisor on SAET Impianti Speciali TEBE Small 05.01 build 1137 devices allows remote attackers to make several types of API calls without authentication, as demonstrated by retrieving password hashes via an inc/utils/REST_API.php?command=CallAPI&customurl=alladminusers call.2019-05-315.0CVE-2019-9105
MISC
MISC
sitecore -- cmsDeserialization of Untrusted Data in the anti CSRF module in Sitecore through 9.1 allows an authenticated attacker to execute arbitrary code by sending a serialized .NET object in an HTTP POST parameter.2019-05-316.5CVE-2019-9875
MISC
MISC
MISC
southrivertech -- titan_ftp_serverA Directory Traversal issue was discovered in the Web GUI in Titan FTP Server 2019 Build 3505. When an authenticated user attempts to preview an uploaded file (through PreviewHandler.ashx) by using a \..\..\ technique, arbitrary files can be loaded in the server response outside the root directory.2019-06-034.0CVE-2019-10009
MISC
FULLDISC
CONFIRM
MISC
EXPLOIT-DB
EXPLOIT-DB
sweetscape -- 010_editorIn SweetScape 010 Editor 9.0.1, improper validation of arguments in the internal implementation of the WSubStr function (provided by the scripting engine) allows an attacker to cause a denial of service by crashing the application.2019-06-055.0CVE-2019-12554
MISC
CONFIRM
sweetscape -- 010_editorIn SweetScape 010 Editor 9.0.1, improper validation of arguments in the internal implementation of the SubStr function (provided by the scripting engine) allows an attacker to cause a denial of service by crashing the application.2019-06-055.0CVE-2019-12555
MISC
CONFIRM
thehive-project -- thehiveAn improper authorization check in the User API in TheHive before 2.13.4 and 3.x before 3.3.1 allows users with read-only or read/write access to escalate their privileges to the administrator's privileges. This affects app/controllers/UserCtrl.scala.2019-06-026.5CVE-2017-18376
MISC
MISC
tinycc -- tinyccAn issue was discovered in Tiny C Compiler (aka TinyCC or TCC) 0.9.27. Compiling a crafted source file leads to a one-byte out-of-bounds write in the gsym_addr function in x86_64-gen.c. This occurs because tccasm.c mishandles section switches.2019-05-314.3CVE-2019-12495
BID
MISC
MISC
tuxera -- ntfs-3gAn integer underflow issue exists in ntfs-3g 2017.3.23. A local attacker could potentially exploit this by running /bin/ntfs-3g with specially crafted arguments from a specially crafted directory to cause a heap buffer overflow, resulting in a crash or the ability to execute arbitrary code. In installations where /bin/ntfs-3g is a setuid-root binary, this could lead to a local escalation of privileges.2019-06-054.4CVE-2019-9755
MISC
vfront -- vfrontVFront 0.99.5 has stored XSS via the admin/sync_reg_tab.php azzera parameter, which is mishandled during admin/error_log.php rendering.2019-06-034.3CVE-2019-9838
MISC
MISC
vfront -- vfrontVFront 0.99.5 has Reflected XSS via the admin/menu_registri.php descrizione_g parameter or the admin/sync_reg_tab.php azzera parameter.2019-06-034.3CVE-2019-9839
MISC
MISC
vtiger -- vtiger_crmvtiger CRM 7.0.1 is affected by one reflected Cross-Site Scripting (XSS) vulnerability affecting version 7.0.1 and probably prior versions. This vulnerability could allow remote unauthenticated attackers to inject arbitrary web script or HTML via index.php?module=Contacts&view=List (app parameter).2019-06-064.3CVE-2018-8047
MISC
yubico -- pam-u2fYubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on the system owned by root. If the debug option is enabled in the PAM configuration, part of the file contents of a symlink target will be logged, possibly revealing sensitive information.2019-06-045.0CVE-2019-12209
MLIST
CONFIRM
CONFIRM
yubico -- pam-u2fIn Yubico pam-u2f 1.0.7, when configured with debug and a custom debug log file is set using debug_file, that file descriptor is not closed when a new process is spawned. This leads to the file descriptor being inherited into the child process; the child process can then read from and write to it. This can leak sensitive information and also, if written to, be used to fill the disk or plant misinformation.2019-06-045.5CVE-2019-12210
MLIST
CONFIRM
CONFIRM
zohocorp -- manageengine_servicedesk_plusAn issue was discovered in Zoho ManageEngine ServiceDesk Plus 9.3. There is XSS via the SiteLookup.do search field.2019-06-054.3CVE-2019-12538
MISC
MISC
zohocorp -- manageengine_servicedesk_plusAn issue was discovered in Zoho ManageEngine ServiceDesk Plus 9.3. There is XSS via the SolutionSearch.do searchText parameter.2019-06-054.3CVE-2019-12541
MISC
MISC
zohocorp -- manageengine_servicedesk_plusAn issue was discovered in Zoho ManageEngine ServiceDesk Plus 9.3. There is XSS via the SearchN.do userConfigID parameter.2019-06-054.3CVE-2019-12542
MISC
MISC
zohocorp -- manageengine_servicedesk_plusAn issue was discovered in Zoho ManageEngine ServiceDesk Plus 9.3. There is XSS via the PurchaseRequest.do serviceRequestId parameter.2019-06-054.3CVE-2019-12543
MISC
MISC

Back to top

 

Low Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
chartered_accountant_:_auditor_website_project -- chartered_accountant_:_auditor_websitePHP Scripts Mall Chartered Accountant : Auditor Website 2.0.1 has Stored XSS in the Profile Update page via the My Name field.2019-06-063.5CVE-2019-7553
MISC
MISC
cisco -- industrial_network_directorA vulnerability in Cisco Industrial Network Director could allow an authenticated, remote attacker to conduct stored cross-site scripting (XSS) attacks. The vulnerability is due to improper validation of content submitted to the affected application. An attacker could exploit this vulnerability by sending requests containing malicious values to the affected system. A successful exploit could allow the attacker to conduct XSS attacks.2019-06-053.5CVE-2019-1882
BID
CISCO
cmsmadesimple -- cms_made_simpleCMS Made Simple 2.2.10 has XSS via the m1_name parameter in "Add Article" under Content -> Content Manager -> News.2019-06-053.5CVE-2019-11226
MISC
FULLDISC
MISC
ibm -- infosphere_information_server_on_cloudIBM InfoSphere Information Server 11.7.1.0 stores a common hard coded encryption key that could be used to decrypt sensitive information. IBM X-Force ID: 159229.2019-06-052.1CVE-2019-4220
XF
CONFIRM
investment_mlm_project -- investment_mlmAn issue was discovered in PHP Scripts Mall Investment MLM Software 2.0.2. Stored XSS was found in the the My Profile Section. This is due to lack of sanitization in the Edit Name section.2019-06-063.5CVE-2019-7552
MISC
MISC
ivanti -- landesk_management_suiteUse of a hard-coded encryption key in Ivanti LANDESK Management Suite (LDMS, aka Endpoint Manager) 10.0.1.168 Service Update 5 may lead to full managed endpoint compromise by an authenticated user with read privileges.2019-06-033.5CVE-2019-12376
MISC
jenkins -- warnings_next_generationA cross-site scripting vulnerability in Jenkins Warnings NG Plugin 5.0.0 and earlier allowed attacker with Job/Configure permission to inject arbitrary JavaScript in build overview pages.2019-05-313.5CVE-2019-10325
MLIST
BID
MISC
liferay -- liferay_portalIn Liferay Portal before 7.1 CE GA4, an XSS vulnerability exists in the SimpleCaptcha API when custom code passes unsanitized input into the "url" parameter of the JSP taglib call <liferay-ui:captcha url="<%= url %>" /> or <liferay-captcha:captcha url="<%= url %>" />. Liferay Portal out-of-the-box behavior with no customizations is not vulnerable.2019-06-032.6CVE-2019-6588
CONFIRM
marvell -- 88ss1074_firmwareMarvell SSD Controller (88SS1074, 88SS1079, 88SS1080, 88SS1093, 88SS1092, 88SS1095, 88SS9174, 88SS9175, 88SS9187, 88SS9188, 88SS9189, 88SS9190, 88SS1085, 88SS1087, 88SS1090, 88SS1100, 88SS1084, 88SS1088, & 88SS1098) devices are vulnerable in manipulating a combination of IO pins to bypass the secure boot protection mechanism.2019-06-052.1CVE-2019-10637
CONFIRM
phome -- empirecmsadmin\db\DoSql.php in EmpireCMS through 7.5 allows XSS via crafted SQL syntax to admin/admin.php.2019-06-073.5CVE-2018-19461
MISC
MISC
MISC
primasystems -- flexairPrima Systems FlexAir devices allow Authenticated Stored XSS.2019-06-053.5CVE-2019-7671
MISC
MISC
MISC
pydio -- pydioA stored XSS vulnerability exists in the web application of Pydio through 8.2.2 that can be exploited by levering the file upload and file preview features of the application. An authenticated attacker can upload an HTML file containing JavaScript code and afterwards a file preview URL can be used to access the uploaded file. If a malicious user shares an uploaded HTML file containing JavaScript code with another user of the application, and tricks an authenticated victim into accessing a URL that results in the HTML code being interpreted by the web browser, then the included JavaScript code is executed under the context of the victim user session.2019-05-313.5CVE-2019-10047
MISC
qemu -- qemutcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.2019-06-032.1CVE-2019-9824
MISC
schneider-electric -- citectscadaIn Vijeo Citect 7.30 and 7.40, and CitectSCADA 7.30 and 7.40, a vulnerability has been identified that may allow an authenticated local user access to Citect user credentials.2019-05-312.1CVE-2019-10981
BID
MISC
CONFIRM
veronalabs -- wp_statisticsThe WP Statistics plugin through 12.6.5 for Wordpress has stored XSS in includes/class-wp-statistics-pages.php. This is related to an account with the Editor role creating a post with a title that contains JavaScript, to attack an admin user.2019-06-023.5CVE-2019-12566
MISC
MISC
MISC

Back to top

 

Severity Not Yet Assigned

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
anviz -- m3_outdoor_rfid_access_control
 
Anviz Global M3 Outdoor RFID Access Control executes any command received from any source. No authentication/encryption is done. Attackers can fully interact with the device: for example, send the "open door" command, download the users list (which includes RFID codes and passcodes in cleartext), or update/create users. The same attack can be executed on a local network and over the internet (if the device is exposed on a public IP address).2019-06-06not yet calculatedCVE-2019-11523
MISC
au_optronics -- data_recorderStored XSS was discovered in AUO Solar Data Recorder before 1.3.0 via the protect/config.htm addr parameter.2019-06-03not yet calculatedCVE-2019-11368
MISC
MISC
au_optronics -- data_recorder
 
An issue was discovered in AUO Solar Data Recorder before 1.3.0. The web portal uses HTTP Basic Authentication and provides the account and password in the WWW-Authenticate attribute. By using this account and password, anyone can login successfully.2019-06-03not yet calculatedCVE-2019-11367
MISC
MISC
MISC
carel_industries -- pcowebAn issue was discovered in Carel pCOWeb prior to B1.2.4. In /config/pw_changeusers.html the device stores cleartext passwords, which may allow sensitive information to be read by someone with access to the device.2019-06-03not yet calculatedCVE-2019-11369
MISC
MISC
carel_industries -- pcowebStored XSS was discovered in Carel pCOWeb prior to B1.2.4, as demonstrated by the config/pw_snmp.html "System contact" field.2019-06-03not yet calculatedCVE-2019-11370
MISC
MISC
chartkick_gem_for_ruby_on_rails -- chartkick_gem_for_ruby_on_railsThe Chartkick gem through 3.1.0 for Ruby allows XSS.2019-06-06not yet calculatedCVE-2019-12732
CONFIRM
CONFIRM
cisco -- industrial_network_director
 
A vulnerability in the software update feature of Cisco Industrial Network Director could allow an authenticated, remote attacker to execute arbitrary code. The vulnerability is due to improper validation of files uploaded to the affected application. An attacker could exploit this vulnerability by authenticating to the affected system using administrator privileges and uploading an arbitrary file. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges.2019-06-05not yet calculatedCVE-2019-1861
BID
CISCO
cisco -- unified_computing_system_c-series_rack_servers
 
A vulnerability in the BIOS upgrade utility of Cisco Unified Computing System (UCS) C-Series Rack Servers could allow an authenticated, local attacker to install compromised BIOS firmware on an affected device. The vulnerability is due to insufficient validation of the firmware image file. An attacker could exploit this vulnerability by executing the BIOS upgrade utility with a specific set of options. A successful exploit could allow the attacker to bypass the firmware signature-verification process and install compromised BIOS firmware on an affected device.2019-06-05not yet calculatedCVE-2019-1880
BID
CISCO
citrix -- application_delivery_managementCitrix Application Delivery Management (ADM) 12.1.x before 12.1.50.33 has Incorrect Access Control.2019-06-05not yet calculatedCVE-2019-9548
CONFIRM
MISC
citrix -- sd-wan_center_and_netscaler_sd-wan_centerCitrix SD-WAN Center 10.2.x before 10.2.1 and NetScaler SD-WAN Center 10.0.x before 10.0.7 allow Command Injection.2019-06-03not yet calculatedCVE-2019-10883
CONFIRM
MISC
MISC
MISC
cloudera -- data_science_workbenchAn SQL injection vulnerability was found in Cloudera Data Science Workbench (CDSW) 1.4.0 through 1.4.2. This would allow any authenticated user to run arbitrary queries against CDSW's internal database. The database contains user contact information, encrypted CDSW passwords (in the case of local authentication), API keys, and stored Kerberos keytabs.2019-06-07not yet calculatedCVE-2018-20091
CONFIRM
MISC
cloudera -- navigator_key_trustee_kmsIn Cloudera Navigator Key Trustee KMS 5.12 and 5.13, incorrect default ACL values allow remote access to purge and undelete API calls on encryption zone keys. The Navigator Key Trustee KMS includes 2 API calls in addition to those in Apache Hadoop KMS: purge and undelete. The KMS ACL values for these commands are keytrustee.kms.acl.PURGE and keytrustee.kms.acl.UNDELETE respectively. The default value for the ACLs in Key Trustee KMS 5.12.0 and 5.13.0 is "*" which allows anyone with knowledge of the name of an encryption zone key and network access to the Key Trustee KMS to make those calls against known encryption zone keys. This can result in the recovery of a previously deleted, but not purged, key (undelete) or the deletion of a key in active use (purge) resulting in loss of access to encrypted HDFS data.2019-06-07not yet calculatedCVE-2018-6185
MISC
CONFIRM
clusterlabs -- libqb
 
libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.2019-06-07not yet calculatedCVE-2019-12779
MISC
MISC
MISC
MISC
dameware -- dameware_remote_mini_control
 
Dameware Remote Mini Control version 12.1.0.34 and prior contains a unauthenticated remote heap overflow due to the server not properly validating RsaPubKeyLen during key negotiation. An unauthenticated remote attacker can cause a heap buffer overflow by specifying a large RsaPubKeyLen, which could cause a denial of service.2019-06-07not yet calculatedCVE-2019-3955
MISC
dell_emc -- openmanage_server_administratorDell EMC OpenManage Server Administrator (OMSA) versions prior to 9.1.0.3 and prior to 9.2.0.4 contain a web parameter tampering vulnerability. A remote unauthenticated attacker could potentially manipulate parameters of web requests to OMSA to create arbitrary files with empty content or delete the contents of any existing file, due to improper input parameter validation2019-06-06not yet calculatedCVE-2019-3723
BID
CONFIRM
dell_emc -- openmanage_server_administrator
 
Dell EMC OpenManage Server Administrator (OMSA) versions prior to 9.1.0.3 and prior to 9.2.0.4 contain an XML external entity (XXE) injection vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to read arbitrary server system files by supplying specially crafted document type definitions (DTDs) in an XML request.2019-06-06not yet calculatedCVE-2019-3722
BID
CONFIRM
digitaldruid.net -- hoteldruid
 
In Hoteldruid before 2.3.1, a division by zero was discovered in $num_tabelle in tab_tariffe.php (aka the numtariffa1 parameter) due to the mishandling of non-numeric values, as demonstrated by the /tab_tariffe.php?anno=[YEAR]&numtariffa1=1a URI. It could allow an administrator to conduct remote denial of service (disrupting certain business functions of the product).2019-06-07not yet calculatedCVE-2019-9084
MISC
MISC
enttec -- datagate_mk2A number of stored XSS vulnerabilities have been identified in the web configuration feature in ENTTEC Datagate Mk2 70044_update_05032019-482 that could allow an unauthenticated threat actor to inject malicious code directly into the application. This affects, for example, the Profile Description field in JSON data to the Profile Editor.2019-06-07not yet calculatedCVE-2019-12774
MISC
enttec -- multiple_productsAn issue was discovered on the ENTTEC Datagate MK2, Storm 24, Pixelator, and E-Streamer MK2 with firmware 70044_update_05032019-482. They include a hard-coded SSH backdoor for remote SSH and SCP access as the root user. A command in the relocate and relocate_revB scripts copies the hardcoded key to the root user's authorized_keys file, enabling anyone with the associated private key to gain remote root access to all affected products.2019-06-07not yet calculatedCVE-2019-12776
MISC
enttec -- multiple_productsAn issue was discovered on the ENTTEC Datagate MK2, Storm 24, Pixelator, and E-Streamer MK2 with firmware 70044_update_05032019-482. They replace secure and protected directory permissions (set as default by the underlying operating system) with highly insecure read, write, and execute directory permissions for all users. By default, /usr/local and all of its subdirectories should have permissions set to only allow non-privileged users to read and execute from the tree structure, and to deny users from creating or editing files in this location. The ENTTEC firmware startup script permits all users to read, write, and execute (rwxrwxrwx) from the /usr, /usr/local, /usr/local/dmxis, and /usr/local/bin/ directories.2019-06-07not yet calculatedCVE-2019-12777
MISC
enttec -- multiple_products
 
An issue was discovered on the ENTTEC Datagate MK2, Storm 24, Pixelator, and E-Streamer MK2 with firmware 70044_update_05032019-482. They allow high-privileged root access by www-data via sudo without requiring appropriate access control. (Furthermore, the user account that controls the web application service is granted full access to run any system commands with elevated privilege, without the need for password authentication. Should vulnerabilities be identified and exploited within the web application, it may be possible for a threat actor to create or run high-privileged binaries or executables that are available within the operating system of the device.)2019-06-07not yet calculatedCVE-2019-12775
MISC
foxit_software -- readerA command injection can occur for specially crafted PDF files in Foxit Reader SDK (ActiveX) Professional 5.4.0.1031 when using the Open File action on a Field. An attacker can leverage this to gain remote code execution.2019-06-07not yet calculatedCVE-2018-19451
MISC
foxit_software -- readerA use after free in the TextBox field Mouse Enter action in IReader_ContentProvider can occur for specially crafted PDF files in Foxit Reader SDK (ActiveX) Professional 5.4.0.1031. An attacker can leverage this to gain remote code execution. Relative to CVE-2018-19444, this has a different free location and requires different JavaScript code for exploitation.2019-06-07not yet calculatedCVE-2018-19452
MISC
freenet -- freenet
 
Freenet 1483 has a MIME type bypass that allows arbitrary JavaScript execution via a crafted Freenet URI.2019-06-05not yet calculatedCVE-2019-9673
MISC
MISC
MISC
gallagher -- command_centre
 
Gallagher Command Centre before 7.80.939, 7.90.x before 7.90.961, and 8.x before 8.00.1128 allows arbitrary event creation and information disclosure via the FT Command Centre Service and FT Controller Service services.2019-06-06not yet calculatedCVE-2019-12492
CONFIRM
CONFIRM
gemalto -- admin_control_centerGemalto Admin Control Center, all versions prior to 7.92, uses cleartext HTTP to communicate with www3.safenet-inc.com to obtain language packs. This allows attacker to do man-in-the-middle (MITM) attack and replace original language pack by malicious one.2019-06-07not yet calculatedCVE-2019-8282
MISC
gemalto -- admin_control_centerHasplm cookie in Gemalto Admin Control Center, all versions prior to 7.92, does not have 'HttpOnly' flag. This allows malicious javascript to steal it.2019-06-07not yet calculatedCVE-2019-8283
MISC
gemalto -- ds3_authentication_serverGemalto DS3 Authentication Server 2.6.1-SP01 has Broken Access Control.2019-06-05not yet calculatedCVE-2019-9158
MISC
MISC
gemalto -- ds3_authentication_serverGemalto DS3 Authentication Server 2.6.1-SP01 allows Local File Disclosure.2019-06-05not yet calculatedCVE-2019-9157
MISC
MISC
gemalto -- ds3_authentication_serverGemalto DS3 Authentication Server 2.6.1-SP01 allows OS Command Injection.2019-06-05not yet calculatedCVE-2019-9156
MISC
MISC
google -- androidIn callGenIDChangeListeners and related functions of SkPixelRef.cpp, there is a possible use after free due to a race condition. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-124232283.2019-06-07not yet calculatedCVE-2019-2095
CONFIRM
google -- androidIn uvc_parse_standard_control of uvc_driver.c, there is a possible out-of-bound read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-111760968.2019-06-07not yet calculatedCVE-2019-2101
CONFIRM
google -- androidIn parseMPEGCCData of NuPlayerCCDecoder.cpp, there is a possible out of bounds write due to missing bounds checks. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-129068792.2019-06-07not yet calculatedCVE-2019-2094
CONFIRM
google -- androidIn the Bluetooth Low Energy (BLE) specification, there is a provided example Long Term Key (LTK). If a BLE device were to use this as a hardcoded LTK, it is theoretically possible for a proximate attacker to remotely inject keystrokes on a paired Android host due to improperly used crypto. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-128843052.2019-06-07not yet calculatedCVE-2019-2102
CONFIRM
google -- androidIn isSeparateProfileChallengeAllowed of DevicePolicyManagerService.java, there is a possible permissions bypass due to a missing permission check. This could lead to local escalation of privilege, with no additional permissions required. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-128599668.2019-06-07not yet calculatedCVE-2019-2092
CONFIRM
google -- androidIn nfa_rw_store_ndef_rx_buf of nfa_rw_act.cc, there is a possible out-of-bound write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-123583388.2019-06-07not yet calculatedCVE-2019-2099
CONFIRM
google -- androidIn areNotificationsEnabledForPackage of NotificationManagerService.java, there is a possible permissions bypass due to a missing permissions check. This could lead to local escalation of privilege, with no additional privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-128599467.2019-06-07not yet calculatedCVE-2019-2098
CONFIRM
google -- androidIn HAliasAnalyzer.Query of hydrogen-alias-analysis.h, there is possible memory corruption due to type confusion. This could lead to remote code execution from a malicious proxy configuration, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-117606285.2019-06-07not yet calculatedCVE-2019-2097
CONFIRM
google -- androidIn GetPermittedAccessibilityServicesForUser of DevicePolicyManagerService.java, there is a possible permissions bypass due to a missing permission check. This could lead to local escalation of privilege, with no additional permissions required. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1. Android ID: A-128599660.2019-06-07not yet calculatedCVE-2019-2091
CONFIRM
google -- androidIn huff_dec_1D of nlc_dec.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-119292397.2019-06-07not yet calculatedCVE-2019-2093
CONFIRM
google -- android
 
In EffectRelease of EffectBundle.cpp, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege in the audio server with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-123237974.2019-06-07not yet calculatedCVE-2019-2096
CONFIRM
google -- android
 
In isPackageDeviceAdminOnAnyUser of PackageManagerService.java, there is a possible permissions bypass due to a missing permissions check. This could lead to local escalation of privilege, with no additional permissions required. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-1285991832019-06-07not yet calculatedCVE-2019-2090
CONFIRM
hapi_fhir -- hapi_fhirXSS exists in the HAPI FHIR testpage overlay module of the HAPI FHIR library before 3.8.0. The attack involves unsanitized HTTP parameters being output in a form page, allowing attackers to leak cookies and other sensitive information from ca/uhn/fhir/to/BaseController.java via a specially crafted URL. (This module is not generally used in production systems so the attack surface is expected to be low, but affected systems are recommended to upgrade immediately.)2019-06-05not yet calculatedCVE-2019-12741
MISC
MISC
MISC
hashicorp -- consulHashiCorp Consul 1.4.0 through 1.5.0 has Incorrect Access Control. Keys not matching a specific ACL rule used for prefix matching in a policy can be deleted by a token using that policy even with default deny settings configured.2019-06-06not yet calculatedCVE-2019-12291
CONFIRM
hewlett_packard_enterprise -- integrated_maintenance_entity_and_maintenance_entity_and_blade_maintenance_entityThe HPE Nonstop Maintenance Entity family of products are vulnerable to local disclosure of information, such as system layout and configuration.2019-06-05not yet calculatedCVE-2019-5394
CONFIRM
hewlett_packard_enterprise -- smart_update_managerA security vulnerability in HPE Smart Update Manager (SUM) prior to v8.4 could allow local unauthorized elevation of privilege.2019-06-05not yet calculatedCVE-2019-11987
CONFIRM
hewlett_packard_enterprise -- smart_update_managerA Remote Unauthorized Access vulnerability was identified in HPE Smart Update Manager (SUM) earlier than version 8.3.5.2019-06-05not yet calculatedCVE-2019-11988
CONFIRM
hgiga -- oaklouds_mailsherlockMulti modules of MailSherlock MSR35 and MSR45 lead to a CSRF vulnerability. It allows attacker to add malicious email sources into whitelist via user/save_list.php?ACSION=&type=email&category=white&locate=big5&cmd=add&new=hacker@socialengineering.com&new_memo=&add=%E6%96%B0%E5%A2%9E without any authorizes.2019-06-03not yet calculatedCVE-2019-9882
MISC
MISC
hgiga -- oaklouds_mailsherlockMulti modules of MailSherlock MSR35 and MSR45 lead to a CSRF vulnerability. It allows attacker to elevate privilege of specific account via useradmin/cf_new.cgi?chief=&wk_group=full&cf_name=test&cf_account=test&cf_email=&cf_acl=Management&apply_lang=&dn= without any authorizes.2019-06-03not yet calculatedCVE-2019-9883
MISC
MISC
htc_corporation -- viveport
 
Privilege escalation due to insecure directory permissions affecting ViveportDesktopService in HTC VIVEPORT before 1.0.0.36 allows local attackers to escalate privileges via DLL hijacking.2019-06-03not yet calculatedCVE-2019-12177
MISC
MISC
MISC
htc_corporation -- viveport
 
Privilege escalation in the "HTC Account Service" and "ViveportDesktopService" in HTC VIVEPORT before 1.0.0.36 allows local attackers to escalate privileges to SYSTEM via reconfiguration of either service.2019-06-03not yet calculatedCVE-2019-12176
MISC
MISC
huawei -- ap_products
 
There is an improper authentication vulnerability in some Huawei AP products before version V200R009C00SPC800. Due to the improper implementation of authentication for the serial port, an attacker could exploit this vulnerability by connecting to the affected products and running a series of commands.2019-06-04not yet calculatedCVE-2019-5298
CONFIRM
huawei -- mate_10_smartphonesThe image processing module of some Huawei Mate 10 smartphones versions before ALP-L29 9.0.0.159(C185) has a memory double free vulnerability. An attacker tricks a user into installing a malicious application, and the application can call special API, which could trigger double free and cause a system crash.2019-06-06not yet calculatedCVE-2019-5305
CONFIRM
huawei -- p20_smartphonesThere is a Factory Reset Protection (FRP) bypass security vulnerability in P20 Huawei smart phones versions before Emily-AL00A 9.0.0.167(C00E81R1P21T8). When re-configuring the mobile phone using the FRP function, an attacker can delete the activation lock after a series of operations. As a result, the FRP function is bypassed and the attacker gains access to the smartphone.2019-06-04not yet calculatedCVE-2019-5306
CONFIRM
huawei -- emily-l29c_smartphonesEmily-L29C Huawei phones versions earlier than 9.0.0.159 (C185E2R1P12T8) have a Factory Reset Protection (FRP) bypass security vulnerability. Before the FRP account is verified and activated during the reset process, the attacker can perform some special operations to bypass the FRP function and obtain the right to use the mobile phone.2019-06-04not yet calculatedCVE-2019-5297
CONFIRM
huawei -- honor_v10_smartphones
 
Huawei Honor V10 smartphones versions earlier than Berkeley-AL20 9.0.0.125(C00E125R2P14T8) have an authorization bypass vulnerability. Due to improper authorization implementation logic, attackers can bypass certain authorization scopes of smart phones by performing specific operations. This vulnerability can be exploited to perform operations beyond the scope of authorization.2019-06-06not yet calculatedCVE-2019-5295
CONFIRM
huawei -- leland_al00a_smartphonesThere is a DoS vulnerability in RTSP module of Leland-AL00A Huawei smart phones versions earlier than Leland-AL00A 9.1.0.111(C00E111R2P10T8). Remote attackers could trick the user into opening a malformed RTSP media stream to exploit this vulnerability. Successful exploit could cause the affected phone abnormal, leading to a DoS condition. (Vulnerability ID: HWPSIRT-2019-02004)2019-06-04not yet calculatedCVE-2019-5284
CONFIRM
huawei -- mate10_smartphonesThere is a double free vulnerability on certain drivers of Huawei Mate10 smartphones versions earlier than ALP-AL00B 9.0.0.181(C00E87R2P20T8). An attacker tricks the user into installing a malicious application, which makes multiple processes operate the same resource at the same time. Successful exploit could cause a denial of service condition.2019-06-06not yet calculatedCVE-2019-5219
CONFIRM
huawei -- mate10_smartphones
 
There is a use after free vulnerability on certain driver component in Huawei Mate10 smartphones versions earlier than ALP-AL00B 9.0.0.167(C00E85R2P20T8). An attacker tricks the user into installing a malicious application, which make the software to reference memory after it has been freed. Successful exploit could cause a denial of service condition.2019-06-06not yet calculatedCVE-2019-5214
CONFIRM
huawei -- mate20_smartphonesMate20 Huawei smartphones versions earlier than HMA-AL00C00B175 have an out-of-bounds read vulnerability. An attacker with a high permission runs some specific commands on the smartphone. Due to insufficient input verification, successful exploit may cause out-of-bounds read of the memory and the system abnormal.2019-06-04not yet calculatedCVE-2019-5296
CONFIRM
huawei -- p20_smartphonesThere is Factory Reset Protection (FRP) bypass security vulnerability in P20 Huawei smart phones versions earlier than Emily-AL00A 9.0.0.167 (C00E81R1P21T8). When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker can login the Talkback mode and can perform some operations to access the setting page. As a result, the FRP function is bypassed.2019-06-04not yet calculatedCVE-2019-5283
CONFIRM
huawei -- p30_smartphonesThere is a man-in-the-middle (MITM) vulnerability on Huawei P30 smartphones versions before ELE-AL00 9.1.0.162(C01E160R1P12/C01E160R2P1), and P30 Pro versions before VOG-AL00 9.1.0.162 (C01E160R1P12/C01E160R2P1). When users establish connection and transfer data through Huawei Share, an attacker could sniff, spoof and do a series of operations to intrude the Huawei Share connection and launch a man-in-the-middle attack to obtain and tamper the data. (Vulnerability ID: HWPSIRT-2019-03109)2019-06-04not yet calculatedCVE-2019-5215
CONFIRM

huawei -- p30_and_p30_pro_4g_lte_devices

Some Huawei 4G LTE devices, P30 versions before ELE-AL00 9.1.0.162(C01E160R1P12/C01E160R2P1) and P30 Pro versions before VOG-AL00 9.1.0.162(C01E160R1P12/C01E160R2P1), are exposed to a message replay vulnerability. For the sake of better compatibility, these devices implement a less strict check on the NAS message sequence number (SN), specifically NAS COUNT. As a result, an attacker can construct a rogue base station and replay the GUTI reallocation command message in certain conditions to tamper with GUTIs, or replay the Identity request message to obtain IMSIs. (Vulnerability ID: HWPSIRT-2019-04107)2019-06-04not yet calculatedCVE-2019-5307
CONFIRM
huawei -- pcmanagerThere is a privilege escalation vulnerability in Huawei PCManager versions earlier than PCManager 9.0.1.50. The attacker can tricking a user to install and run a malicious application to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege.2019-06-06not yet calculatedCVE-2019-5241
CONFIRM
huawei -- pcmanagerThere is a code execution vulnerability in Huawei PCManager versions earlier than PCManager 9.0.1.50. The attacker can tricking a user to install and run a malicious application to exploit this vulnerability. Successful exploitation may cause the attacker to execute malicious code and read/write memory.2019-06-06not yet calculatedCVE-2019-5242
CONFIRM
huawei -- y9_2019_smartphonesThere is an information leak vulnerability in some Huawei phones, versions earlier than Jackman-L21 8.2.0.155(C185R1P2). When a local attacker uses the camera of a smartphone, the attacker can exploit this vulnerability to obtain sensitive information by performing a series of operations.2019-06-04not yet calculatedCVE-2019-5281
CONFIRM
huawei -- honor_v10_smartphonesThere is a race condition vulnerability on Huawei Honor V10 smartphones versions earlier than Berkeley-AL20 9.0.0.156(C00E156R2P14T8), Honor 10 smartphones versions earlier than Columbia-AL10B 9.0.0.156(C00E156R1P20T8) and Honor Play smartphones versions earlier than Cornell-AL00A 9.0.0.156(C00E156R1P13T8). An attacker tricks the user into installing a malicious application, which makes multiple processes to operate the same variate at the same time. Successful exploit could cause execution of malicious code.2019-06-06not yet calculatedCVE-2019-5216
CONFIRM
huawei -- mate_9_pro_smartphonesMate 9 Pro Huawei smartphones earlier than LON-L29C 8.0.0.361(C636) versions have an information leak vulnerability due to the lack of input validation. An attacker tricks the user who has root privilege to install an application on the smart phone, and the application can read some process information, which may cause sensitive information leak.2019-06-04not yet calculatedCVE-2019-5244
CONFIRM
huawei -- mate_9_pro_smartphonesThere is an information disclosure vulnerability on Mate 9 Pro Huawei smartphones versions earlier than LON-AL00B9.0.1.150 (C00E61R1P8T8). An attacker could view the photos after a series of operations without unlocking the screen lock. Successful exploit could cause an information disclosure condition.2019-06-04not yet calculatedCVE-2019-5217
CONFIRM
ibm -- infosphere_information_server
 
IBM InfoSphere Information Server 11.5 and 11.7 is affected by an information disclosure vulnerability. Sensitive information in an error message may be used to conduct further attacks against the system. IBM X-Force ID: 159945.2019-06-06not yet calculatedCVE-2019-4257
XF
CONFIRM
ibm -- intelligent_operations_centerIBM Intelligent Operations Center (IOC) 5.1.0 through 5.2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157015.2019-06-07not yet calculatedCVE-2019-4070
XF
CONFIRM
ibm -- intelligent_operations_centerIBM Intelligent Operations Center (IOC) 5.1.0 through 5.2.0 does not properly validate file types, allowing an attacker to upload malicious content. IBM X-Force ID: 157014.2019-06-07not yet calculatedCVE-2019-4069
XF
CONFIRM
ibm -- intelligent_operations_centerIBM Intelligent Operations Center (IOC) 5.1.0 through 5.2.0 is vulnerable to user enumeration, allowing an attacker to brute force into the system. IBM X-Force ID: 157013.2019-06-07not yet calculatedCVE-2019-4068
XF
CONFIRM
ibm -- intelligent_operations_centerIBM Intelligent Operations Center (IOC) 5.1.0 through 5.2.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 157012.2019-06-07not yet calculatedCVE-2019-4067
XF
CONFIRM
ibm -- intelligent_operations_center
 
IBM Intelligent Operations Center (IOC) 5.1.0 through 5.2.0 could allow an authenciated user to create arbitrary users which could cause ID management issues and result in code execution. IBM X-Force ID: 157011.2019-06-07not yet calculatedCVE-2019-4066
XF
CONFIRM
ibm -- jazz_for_serivce_management
 
IBM Jazz for Service Management 1.1.3, 1.1.3.1, and 1.1.3.2 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 159122.2019-06-05not yet calculatedCVE-2019-4201
XF
CONFIRM
ibm -- maximo_asset_management
 
IBM Maximo Asset Management 7.6 could allow a physical user of the system to obtain sensitive information from a previous user of the same machine. IBM X-Force ID: 156311.2019-06-05not yet calculatedCVE-2019-4048
XF
CONFIRM
ibm -- security_information_queueIBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, and 1.0.2 is missing the HTTP Strict Transport Security header. Users can navigate by mistake to the unencrypted version of the web application or accept invalid certificates. This leads to sensitive data being sent unencrypted over the wire. IBM X-Force ID: 158661.2019-06-06not yet calculatedCVE-2019-4162
XF
CONFIRM
ibm -- security_information_queueIBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, and 1.0.2 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 159227.2019-06-06not yet calculatedCVE-2019-4218
XF
CONFIRM
ibm -- security_information_queueIBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, and 1.0.2 generates an error message that includes sensitive information that could be used in further attacks against the system. IBM X-Force ID: 159228.2019-06-06not yet calculatedCVE-2019-4219
XF
CONFIRM
ibm -- security_information_queueIBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, and 1.0.2 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 158660.2019-06-06not yet calculatedCVE-2019-4161
XF
CONFIRM
ibm -- security_information_queueIBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, and 1.0.2 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 159226.2019-06-06not yet calculatedCVE-2019-4217
XF
CONFIRM
inateck -- wp1001_wireless_presenterDue to unencrypted and unauthenticated data communication, the wireless presenter Inateck WP1001 v1.3C is prone to keystroke injection attacks. Thus, an attacker is able to send arbitrary keystrokes to a victim's computer system, e.g., to install malware when the target system is unattended. In this way, an attacker can remotely take control over the victim's computer that is operated with an affected receiver of this device.2019-06-07not yet calculatedCVE-2019-12505
MISC
BUGTRAQ
MISC
inateck -- wp2002_wireless_presenter
 
Due to unencrypted and unauthenticated data communication, the wireless presenter Inateck WP2002 is prone to keystroke injection attacks. Thus, an attacker is able to send arbitrary keystrokes to a victim's computer system, e.g., to install malware when the target system is unattended. In this way, an attacker can remotely take control over the victim's computer that is operated with an affected receiver of this device.2019-06-07not yet calculatedCVE-2019-12504
MISC
BUGTRAQ
MISC
kyocera -- command_center_rxKyocera Command Center RX TASKalfa4501i and TASKalfa5052ci allows remote attackers to abuse the Test button in the machine address book to obtain a cleartext FTP or SMB password.2019-06-06not yet calculatedCVE-2019-6452
MISC
MISC
logitech -- r700_laser_presentation_remoteDue to unencrypted and unauthenticated data communication, the wireless presenter Logitech R700 Laser Presentation Remote R-R0010 is prone to keystroke injection attacks. Thus, an attacker is able to send arbitrary keystrokes to a victim's computer system, e.g., to install malware when the target system is unattended. In this way, an attacker can remotely take control over the victim's computer that is operated with an affected receiver of this device.2019-06-07not yet calculatedCVE-2019-12506
MISC
BUGTRAQ
MISC
maccms -- maccms
 
Maccms through 8.0 allows XSS via the site_keywords field to index.php?m=system-config because of tpl/module/system.php and tpl/html/system_config.html, related to template/paody/html/vod_index.html.2019-06-07not yet calculatedCVE-2018-19465
MISC
MISC
martin_raiber -- urbackupIn UrBackup 2.2.6, an attacker can send a malformed request to the client over the network, and trigger a fileservplugin/CClientThread.cpp CClientThread::GetFileHashAndMetadata NULL pointer dereference, leading to shutting down the client application.2019-06-07not yet calculatedCVE-2018-20014
MISC
MISC
micro_focus -- solution_business_managerMicro Focus Solution Business Manager versions prior to 11.4.2 is susceptible to open redirect.2019-06-07not yet calculatedCVE-2019-3477
CONFIRM
moxa -- awk-3121An issue was discovered on Moxa AWK-3121 1.14 devices. The device by default allows HTTP traffic thus providing an insecure communication mechanism for a user connecting to the web server. This allows an attacker to sniff the traffic easily and allows an attacker to compromise sensitive data such as credentials.2019-06-07not yet calculatedCVE-2018-10690
MISC
BUGTRAQ
moxa -- awk-3121An issue was discovered on Moxa AWK-3121 1.14 devices. It is intended that an administrator can download /systemlog.log (the system log). However, the same functionality allows an attacker to download the file without any authentication or authorization.2019-06-07not yet calculatedCVE-2018-10691
MISC
BUGTRAQ
moxa -- awk-3121An issue was discovered on Moxa AWK-3121 1.14 devices. The session cookie "Password508" does not have an HttpOnly flag. This allows an attacker who is able to execute a cross-site scripting attack to steal the cookie very easily.2019-06-07not yet calculatedCVE-2018-10692
MISC
BUGTRAQ
moxa -- awk-3121An issue was discovered on Moxa AWK-3121 1.14 devices. It provides ping functionality so that an administrator can execute ICMP calls to check if the network is working correctly. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "srvName" is susceptible to a buffer overflow. By crafting a packet that contains a string of 516 characters, it is possible for an attacker to execute the attack.2019-06-07not yet calculatedCVE-2018-10693
MISC
BUGTRAQ
moxa -- awk-3121An issue was discovered on Moxa AWK-3121 1.14 devices. The device provides a Wi-Fi connection that is open and does not use any encryption mechanism by default. An administrator who uses the open wireless connection to set up the device can allow an attacker to sniff the traffic passing between the user's computer and the device. This can allow an attacker to steal the credentials passing over the HTTP connection as well as TELNET traffic. Also an attacker can MITM the response and infect a user's computer very easily as well.2019-06-07not yet calculatedCVE-2018-10694
MISC
BUGTRAQ
moxa -- awk-3121An issue was discovered on Moxa AWK-3121 1.14 devices. It provides alert functionality so that an administrator can send emails to his/her account when there are changes to the device's network. However, the same functionality allows an attacker to execute commands on the device. The POST parameters "to1,to2,to3,to4" are all susceptible to buffer overflow. By crafting a packet that contains a string of 678 characters, it is possible for an attacker to execute the attack.2019-06-07not yet calculatedCVE-2018-10695
MISC
BUGTRAQ
moxa -- awk-3121An issue was discovered on Moxa AWK-3121 1.14 devices. The device provides a web interface to allow an administrator to manage the device. However, this interface is not protected against CSRF attacks, which allows an attacker to trick an administrator into executing actions without his/her knowledge, as demonstrated by the forms/iw_webSetParameters and forms/webSetMainRestart URIs.2019-06-07not yet calculatedCVE-2018-10696
MISC
BUGTRAQ
moxa -- awk-3121An issue was discovered on Moxa AWK-3121 1.14 devices. The Moxa AWK 3121 provides certfile upload functionality so that an administrator can upload a certificate file used for connecting to the wireless network. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_privatePass" is susceptible to this injection. By crafting a packet that contains shell metacharacters, it is possible for an attacker to execute the attack.2019-06-07not yet calculatedCVE-2018-10699
MISC
BUGTRAQ
moxa -- awk-3121An issue was discovered on Moxa AWK-3121 1.14 devices. The Moxa AWK 3121 provides ping functionality so that an administrator can execute ICMP calls to check if the network is working correctly. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "srvName" is susceptible to this injection. By crafting a packet that contains shell metacharacters, it is possible for an attacker to execute the attack.2019-06-07not yet calculatedCVE-2018-10697
MISC
BUGTRAQ
moxa -- awk-3121An issue was discovered on Moxa AWK-3121 1.14 devices. The device enables an unencrypted TELNET service by default. This allows an attacker who has been able to gain an MITM position to easily sniff the traffic between the device and the user. Also an attacker can easily connect to the TELNET daemon using the default credentials if they have not been changed by the user.2019-06-07not yet calculatedCVE-2018-10698
MISC
BUGTRAQ
moxa -- awk-3121An issue was discovered on Moxa AWK-3121 1.19 devices. It provides functionality so that an administrator can change the name of the device. However, the same functionality allows an attacker to execute XSS by injecting an XSS payload. The POST parameter "iw_board_deviceName" is susceptible to this injection.2019-06-07not yet calculatedCVE-2018-10700
MISC
BUGTRAQ
moxa -- awk-3121An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_filename" is susceptible to buffer overflow. By crafting a packet that contains a string of 162 characters, it is possible for an attacker to execute the attack.2019-06-07not yet calculatedCVE-2018-10701
MISC
BUGTRAQ
moxa -- awk-3121An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_filename" is susceptible to command injection via shell metacharacters.2019-06-07not yet calculatedCVE-2018-10702
MISC
BUGTRAQ
moxa -- awk-3121An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_serverip" is susceptible to buffer overflow. By crafting a packet that contains a string of 480 characters, it is possible for an attacker to execute the attack.2019-06-07not yet calculatedCVE-2018-10703
MISC
BUGTRAQ
multiple_vendors -- multiple_devices
 
Broadcom firmware before summer 2014 on Nexus 5 BCM4335C0 2012-12-11, Raspberry Pi 3 BCM43438A1 2014-06-02, and unspecifed other devices does not properly restrict LMP commnds and executes certain memory contents upon receiving an LMP command, as demonstrated by executing an HCI command.2019-06-07not yet calculatedCVE-2018-19860
CONFIRM
MISC
netgear -- insight_cloudNETGEAR Insight Cloud with firmware before Insight 5.6 allows remote authenticated users to achieve command injection.2019-06-03not yet calculatedCVE-2019-12591
MISC
nextcloud -- nextcloudAn OS Command Injection has been discovered in the Nextcloud App: Extract prior to version 1.2.0.2019-06-07not yet calculatedCVE-2019-5441
MISC
nextcloud -- nextcloudlib/Controller/ExtractionController.php in the Extract add-on before 1.2.0 for Nextcloud allows Remote Code Execution via shell metacharacters in a RAR filename via ajax/extractRar.php (nameOfFile and directory parameters).2019-06-05not yet calculatedCVE-2019-12739
MISC
MISC
nuuo -- network_video_recorder_firmwareNUUO Network Video Recorder Firmware 1.7.x through 3.3.x allows unauthenticated attackers to execute arbitrary commands via shell metacharacters to handle_load_config.php.2019-05-31not yet calculatedCVE-2019-9653
MISC
MISC
MISC
nvidia -- geforce_experienceNVIDIA GeForce Experience versions prior to 3.19 contains a vulnerability in the Web Helper component, in which an attacker with local system access can craft input that may not be properly validated. Such an attack may lead to code execution, denial of service or information disclosure.2019-05-31not yet calculatedCVE-2019-5678
CONFIRM
orpak -- siteomatAn insecure communication was found between a user and the Orpak SiteOmat management console for all known versions, due to an invalid SSL certificate. The attack allows for an eavesdropper to capture the communication and decrypt the data.2019-06-03not yet calculatedCVE-2017-14852
MISC
BID
MISC
orpak -- siteomatA SQL injection vulnerability exists in all Orpak SiteOmat versions prior to 2017-09-25. The vulnerability is in the login page, where the authentication validation process contains an insecure SELECT query. The attack allows for authentication bypass.2019-06-03not yet calculatedCVE-2017-14851
BID
MISC
MISC
orpak -- siteomatAn authentication bypass was found in an unknown area of the SiteOmat source code. All SiteOmat BOS versions are affected, prior to the submission of this exploit. Also, the SiteOmat does not force administrators to switch passwords, leaving SSH and HTTP remote authentication open to public.2019-06-03not yet calculatedCVE-2017-14728
MISC
BID
MISC
orpak -- siteomatAll known versions of the Orpak SiteOmat web management console is vulnerable to multiple instances of Stored Cross-site Scripting due to improper external user-input validation. An attacker with access to the web interface is able to hijack sessions or navigate victims outside of SiteOmat, to a malicious server owned by him.2019-06-03not yet calculatedCVE-2017-14850
BID
MISC
MISC
panasonic -- fpwin_proPanasonic FPWIN Pro version 7.3.0.0 and prior allows attacker-created project files to be loaded by an authenticated user triggering incompatible type errors because the resource does not have expected properties. This may lead to remote code execution.2019-06-07not yet calculatedCVE-2019-6532
BID
MISC
panasonic -- fpwin_proPanasonic FPWIN Pro version 7.3.0.0 and prior allows attacker-created project files to be loaded by an authenticated user causing heap-based buffer overflows, which may lead to remote code execution.2019-06-07not yet calculatedCVE-2019-6530
BID
MISC
papercut -- papercut_mf_and_papercut_ng
 
An unspecified vulnerability in the application server in PaperCut MF and NG versions 18.3.8 and earlier and versions 19.0.3 and earlier allows remote attackers to execute arbitrary code via an unspecified vector.2019-06-06not yet calculatedCVE-2019-12135
CONFIRM
CONFIRM
phpscriptsmall.com -- api_based_travel_bookingAn issue was discovered in PHP Scripts Mall API Based Travel Booking 3.4.7. There is Reflected XSS via the flight-results.php d2 parameter.2019-06-06not yet calculatedCVE-2019-7554
MISC
MISC
pivotal -- pivotal_ops_manager
 
The Pivotal Ops Manager, 2.2.x versions prior to 2.2.23, 2.3.x versions prior to 2.3.16, 2.4.x versions prior to 2.4.11, and 2.5.x versions prior to 2.5.3, contain configuration that circumvents refresh token expiration. A remote authenticated user can gain access to a browser session that was supposed to have expired, and access Ops Manager resources.2019-06-06not yet calculatedCVE-2019-3790
BID
CONFIRM
pivotal -- spring_data_jpa
 
This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.2019-06-03not yet calculatedCVE-2019-3802
CONFIRM
progress -- sitefinityProgress Sitefinity 10.1.6536 does not invalidate session cookies upon logouts. It instead tries to overwrite the cookie in the browser, but it remains valid on the server side. This means the cookie can be reused to maintain access to the account, even if the account credentials and permissions are changed.2019-06-06not yet calculatedCVE-2019-7215
MISC
CONFIRM
python -- pythonA security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.2019-06-07not yet calculatedCVE-2019-10160
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
MISC
quest -- kace_k1000_applianceThe Quest Kace K1000 Appliance, versions prior to 9.0.270, allows a remote attacker to exploit the misconfigured Cross-Origin Resource Sharing (CORS) mechanism. An unauthenticated, remote attacker could exploit this vulnerability to perform sensitive actions such as adding a new administrator account or changing the appliance?s settings. A malicious internal user could also gain administrator privileges of this appliance and use it to visit a malicious link that exploits this vulnerability. This could cause the application to perform sensitive actions such as adding a new administrator account or changing the appliance?s settings. An unauthenticated, remote attacker could add an administrator-level account or change the appliance's settings.2019-06-03not yet calculatedCVE-2018-5406
MISC
CONFIRM
CERT-VN
quest -- kace_k1000_applianceThe Quest Kace K1000 Appliance, versions prior to 9.0.270, allows an authenticated least privileged user with 'User Console Only' rights to potentially inject arbitrary JavaScript code on the tickets page. Script execution could allow a malicious user of the system to steal session cookies of other users including Administrator and take over their session. This can further be exploited to launch other attacks. The software also does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other user. An authenticated user with 'user console only' rights may inject arbitrary JavaScript, which could result in an attacker taking over a session of others, including an Administrator.2019-06-03not yet calculatedCVE-2018-5405
MISC
CONFIRM
CERT-VN
quest -- kace_k1000_applianceThe Quest Kace K1000 Appliance, versions prior to 9.0.270, allows an authenticated, remote attacker with least privileges ('User Console Only' role) to potentially exploit multiple Blind SQL Injection vulnerabilities to retrieve sensitive information from the database or copy the entire database. An authenticated remote attacker could leverage Blind SQL injections to obtain sensitive data.2019-06-03not yet calculatedCVE-2018-5404
CONFIRM
CERT-VN
rancher -- rancherIn Rancher 2 through 2.2.3, Project owners can inject additional fluentd configuration to read files or execute arbitrary commands inside the fluentd container.2019-06-06not yet calculatedCVE-2019-12303
CONFIRM
CONFIRM
rancher -- rancher
 
In Rancher 1 and 2 through 2.2.3, unprivileged users (if allowed to deploy nodes) can gain admin access to the Rancher management plane because node driver options intentionally allow posting certain data to the cloud. The problem is that a user could choose to post a sensitive file such as /root/.kube/config or /var/lib/rancher/management-state/cred/kubeconfig-system.yaml.2019-06-06not yet calculatedCVE-2019-12274
CONFIRM
CONFIRM
salesagility -- suitecrmSuiteCRM 7.8.x before 7.8.30, 7.10.x before 7.10.17, and 7.11.x before 7.11.5 allows SQL Injection (issue 2 of 3).2019-06-07not yet calculatedCVE-2019-12600
CONFIRM
salesagility -- suitecrmSuiteCRM 7.8.x before 7.8.30, 7.10.x before 7.10.17, and 7.11.x before 7.11.5 allows SQL Injection (issue 3 of 3).2019-06-07not yet calculatedCVE-2019-12601
CONFIRM
salesagility -- suitecrmSuiteCRM 7.10.x before 7.10.17 and 7.11.x before 7.11.5 allows SQL Injection.2019-06-07not yet calculatedCVE-2019-12599
CONFIRM
salesagility -- suitecrmSuiteCRM 7.8.x before 7.8.30, 7.10.x before 7.10.17, and 7.11.x before 7.11.5 allows SQL Injection (issue 1 of 3).2019-06-07not yet calculatedCVE-2019-12598
CONFIRM
samsung -- galaxy_appsSamsung Galaxy Apps before 4.4.01.7 allows modification of the hostname used for load balancing on installations of applications through a man-in-the-middle attack. An attacker may trick Galaxy Apps into using an arbitrary hostname for which the attacker can provide a valid SSL certificate, and emulate the API of the app store to modify existing apps at installation time. The specific flaw involves an HTTP method to obtain the load-balanced hostname that enforces SSL only after obtaining a hostname from the load balancer, and a missing app signature validation in the application XML. An attacker can exploit this vulnerability to achieve Remote Code Execution on the device. The Samsung ID is SVE-2018-12071.2019-06-07not yet calculatedCVE-2018-20135
MISC
MISC
samsung -- galaxy_s9This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Galaxy S9 prior to 1.4.20.2. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the GameServiceReceiver update mechanism. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7477.2019-06-03not yet calculatedCVE-2019-6742
MISC
samsung -- galaxy_s9This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Galaxy S9 prior to January 2019 Security Update (SMR-JAN-2019 - SVE-2018-13467). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the ASN.1 parser. When parsing ASN.1 strings, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7472.2019-06-03not yet calculatedCVE-2019-6740
MISC
samsung -- galaxy_s9This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Galaxy S9 prior to January 2019 Security Update (SMR-JAN-2019 - SVE-2018-13467). User interaction is required to exploit this vulnerability in that the target must connect to a wireless network. The specific flaw exists within the captive portal. By manipulating HTML, an attacker can force a page redirection. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7476.2019-06-03not yet calculatedCVE-2019-6741
MISC
scamera -- security_camera_cz_applicationThe Security Camera CZ application through 1.6.8 for Android stores potentially sensitive recorded video in external data storage, which is readable by any application.2019-06-07not yet calculatedCVE-2019-12763
MISC
sitecore -- experience_platformSitecore Experience Platform (XP) prior to 9.1.1 is vulnerable to remote code execution via deserialization, aka TFS # 293863. An authenticated user with necessary permissions is able to remotely execute OS commands by sending a crafted serialized object.2019-06-06not yet calculatedCVE-2019-11080
MISC
MISC
solarwinds -- serv-u_ftp_serverThe local management interface in SolarWinds Serv-U FTP Server 15.1.6.25 has incorrect access controls that permit local users to bypass authentication in the application and execute code in the context of the Windows SYSTEM account, leading to privilege escalation. To exploit this vulnerability, an attacker must have local access the the host running Serv-U, and a Serv-U administrator have an active management console session.2019-06-07not yet calculatedCVE-2018-19999
MISC
MISC
soyal -- ar-727h_and_ar-829ev5_devicesOn SOYAL AR-727H and AR-829Ev5 devices, all CGI programs allow unauthenticated POST access.2019-06-06not yet calculatedCVE-2019-6451
MISC
MISC
supra -- smart_cloud_tvSupra Smart Cloud TV allows remote file inclusion in the openLiveURL function, which allows a local attacker to broadcast fake video without any authentication via a /remote/media_control?action=setUri&uri= URI.2019-06-07not yet calculatedCVE-2019-12477
MISC
MISC
synaptics -- sound_device_driversIncorrect access control in the CxUtilSvc component of the Synaptics Sound Device drivers prior to version 2.29 allows a local attacker to increase access privileges to the Windows Registry via an unpublished API.2019-06-05not yet calculatedCVE-2019-9730
CONFIRM
MISC
MISC
thinstation -- thinstationCommand injection is possible in ThinStation through 6.1.1 via shell metacharacters after the cgi-bin/CdControl.cgi action= substring, or after the cgi-bin/VolControl.cgi OK= substring.2019-06-07not yet calculatedCVE-2019-12771
MISC
thomson_reuters -- desktopAn issue was discovered in Thomson Reuters Desktop Extensions 1.9.0.358. An unauthenticated directory traversal and local file inclusion vulnerability in the ThomsonReuters.Desktop.Service.exe and ThomsonReuters.Desktop.exe allows a remote attacker to list or enumerate sensitive contents of files via a \.. to port 6677. Additionally, this could allow for privilege escalation by dumping the affected machine's SAM and SYSTEM database files, as well as remote code execution.2019-06-05not yet calculatedCVE-2019-8385
MISC
MISC
tp-link -- tl-wr940n_routerTP-Link TL-WR940N is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the ipAddrDispose function. By sending specially crafted ICMP echo request packets, a remote authenticated attacker could overflow a buffer and execute arbitrary code on the system with elevated privileges.2019-06-06not yet calculatedCVE-2019-6989
MISC
ubiquiti -- edgeos_on_edgerouter_lite_devicesUbiquiti EdgeOS 1.9.1 on EdgeRouter Lite devices allows remote attackers to execute arbitrary code with admin credentials, because /opt/vyatta/share/vyatta-cfg/templates/system/static-host-mapping/host-name/node.def does not sanitize the 'alias' or 'ips' parameter for shell metacharacters.2019-06-07not yet calculatedCVE-2018-5265
MISC
ubiquiti -- unifi_52_devicesUbiquiti UniFi 52 devices, when Hotspot mode is used, allow remote attackers to bypass intended restrictions on "free time" Wi-Fi usage by sending a /guest/s/default/ request to obtain a cookie, and then using this cookie in a /guest/s/default/login request with the byfree parameter.2019-06-07not yet calculatedCVE-2018-5264
MISC
vmware -- tools
 
VMware Tools for Windows (10.x before 10.3.10) update addresses an out of bounds read vulnerability in vm3dmp driver which is installed with vmtools in Windows guest machines. A local attacker with non-administrative access to a Windows guest with VMware Tools installed may be able to leak kernel information or create a denial of service attack on the same Windows guest machine.2019-06-06not yet calculatedCVE-2019-5522
BID
CONFIRM
vmware -- workstationVMware Workstation (15.x before 15.1.0) contains a use-after-free vulnerability in the Advanced Linux Sound Architecture (ALSA) backend. A malicious user with normal user privileges on the guest machine may exploit this issue in conjunction with other issues to execute code on the Linux host where Workstation is installed.2019-06-06not yet calculatedCVE-2019-5525
BID
CONFIRM
wordpress -- wordpress
 
The WP Live Chat Support Pro plugin through 8.0.26 for WordPress contains an arbitrary file upload vulnerability. This results from an incomplete patch for CVE-2018-12426. Arbitrary file upload is achieved by using a non-blacklisted executable file extension in conjunction with a whitelisted file extension, and prepending "magic bytes" to the payload to pass MIME checks. Specifically, an unauthenticated remote user submits a crafted file upload POST request to the REST api remote_upload endpoint. The file contains data that will fool the plugin's MIME check into classifying it as an image (which is a whitelisted file extension) and finally a trailing .phtml file extension.2019-06-03not yet calculatedCVE-2019-11185
MISC
MISC
MISC
workday -- workday
 
CSV Injection (aka Excel Macro Injection or Formula Injection) exists in the export feature in Workday through 32 via a value (provided by a low-privileged user in a contact form field) that is mishandled in a CSV export.2019-06-06not yet calculatedCVE-2019-12134
MISC
x-cart -- x-cart
 
X-Cart V5 is vulnerable to XSS via the CategoryFilter2 parameter.2019-06-06not yet calculatedCVE-2019-7220
MISC
MISC
xiaomi -- mi6_browserThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Xiaomi Mi6 Browser prior to 10.4.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WebAssembly.Instance method. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7466.2019-06-03not yet calculatedCVE-2019-6743
MISC
xiaomi -- mi_5s_plus_devicesXiaomi Mi 5s Plus devices allow attackers to trigger touchscreen anomalies via a radio signal between 198 kHz and 203 kHz, as demonstrated by a transmitter and antenna hidden just beneath the surface of a coffee-shop table, aka Ghost Touch.2019-06-06not yet calculatedCVE-2019-12762
MISC
MISC
xiaomi -- redmi_note_5_pro_devices_and_redmi_android_phonesXiaomi Stock Browser 10.2.4.g on Xiaomi Redmi Note 5 Pro devices and other Redmi Android phones allows content provider injection. In other words, a third-party application can read the user's cleartext browser history via an app.provider.query content://com.android.browser.searchhistory/searchhistory request.2019-06-07not yet calculatedCVE-2018-20523
MISC
MISC

Back to top

Please share your thoughts

We recently updated our anonymous product survey; we’d welcome your feedback.