Vulnerability Summary for the Week of July 8, 2019

Original release date: July 15, 2019

 

The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit the NIST NVD for updated vulnerability entries, which include CVSS scores once they are available.

 

High Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
contao — contao Contao 4.x allows SQL Injection. Fixed in Contao 4.4.39 and Contao 4.7.5. 2019-07-09 7.5 CVE-2019-11512
MISC
dlink — central_wifimanager /web/Lib/Action/IndexAction.class.php in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 allows remote attackers to execute arbitrary PHP code via a cookie because a cookie’s username field allows eval injection, and an empty password bypasses authentication. 2019-07-06 7.5 CVE-2019-13372
MISC
CONFIRM
MISC
dlink — central_wifimanager An issue was discovered in the D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6. Input does not get validated and arbitrary SQL statements can be executed in the database via the /web/Public/Conn.php parameter dbSQL. 2019-07-06 7.5 CVE-2019-13373
MISC
CONFIRM
MISC
dlink — central_wifimanager A SQL Injection was discovered in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 in PayAction.class.php with the index.php/Pay/passcodeAuth parameter passcode. The vulnerability does not need any authentication. 2019-07-06 7.5 CVE-2019-13375
MISC
CONFIRM
MISC
dlink — dir-655_firmware D-Link DIR-655 C devices before 3.02B05 BETA03 allow remote attackers to execute arbitrary commands via shell metacharacters in the online_firmware_check.cgi check_fw_url parameter. 2019-07-11 10.0 CVE-2019-13561
MISC
MISC
MISC
dlink — dir-818lw_firmware An issue was discovered on D-Link DIR-818LW devices with firmware 2.06betab01. There is a command injection in HNAP1 (exploitable with Authentication) via shell metacharacters in the MTU field to SetWanSettings. 2019-07-10 9.0 CVE-2019-13481
BID
MISC
dlink — dir-818lw_firmware An issue was discovered on D-Link DIR-818LW devices with firmware 2.06betab01. There is a command injection in HNAP1 (exploitable with Authentication) via shell metacharacters in the Type field to SetWanSettings. 2019-07-10 10.0 CVE-2019-13482
BID
MISC
fortinet — fcm-mb40_firmware Dynacolor FCM-MB40 v1.2.0.0 devices allow remote attackers to execute arbitrary commands via a crafted parameter to a CGI script, as demonstrated by sed injection in cgi-bin/camctrl_save_profile.cgi (save parameter) and cgi-bin/ddns.cgi. 2019-07-07 9.0 CVE-2019-13398
MISC
google — android In ihevcd_sao_shift_ctb of ihevcd_sao.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-130023983. 2019-07-08 9.3 CVE-2019-2106
CONFIRM
google — android In ihevcd_parse_pps of ihevcd_parse_headers.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-130024844. 2019-07-08 9.3 CVE-2019-2107
CONFIRM
google — android In MakeMPEG4VideoCodecSpecificData of AVIExtractor.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1. Android ID: A-130651570. 2019-07-08 9.3 CVE-2019-2109
CONFIRM
google — android In loop of DnsTlsSocket.cpp, there is a possible heap memory corruption due to a use after free. This could lead to remote code execution in the netd server with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-122856181. 2019-07-08 7.5 CVE-2019-2111
CONFIRM
google — android In several functions of alarm.cc, there is possible memory corruption due to a use after free. This could lead to local code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-8.0 Android-8.1 Android-9. Android ID: A-117997080. 2019-07-08 7.2 CVE-2019-2112
CONFIRM
hidea — az_admin hidea.com AZ Admin 1.0 has news_det.php?cod= SQL Injection. 2019-07-11 7.5 CVE-2019-13507
MISC
hsycms — hsycms An issue was discovered in Hsycms V1.1. There is a SQL injection vulnerability via a /news/*.html page. 2019-07-10 7.5 CVE-2019-10653
MISC
oniguruma_project — oniguruma A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust. 2019-07-10 7.5 CVE-2019-13224
CONFIRM
strong_password_project — strong_password The strong_password gem 0.0.7 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 0.0.6. 2019-07-08 7.5 CVE-2019-13354
MISC
MISC
MISC
MISC
teclib-edition — fields An issue was discovered in the Teclib Fields plugin through 1.9.2 for GLPI. it allows SQL Injection via container_id and old_order parameters to ajax/reorder.php by an unauthenticated user. 2019-07-10 7.5 CVE-2019-12723
MISC
MISC
CONFIRM
trape_project — trape Trape through 2019-05-08 has SQL injection via the data[2] variable in core/db.py, as demonstrated by the /bs t parameter. 2019-07-10 7.5 CVE-2019-13489
MISC
typo3 — typo3 TYPO3 8.x through 8.7.26 and 9.x through 9.5.7 allows Deserialization of Untrusted Data. 2019-07-09 7.5 CVE-2019-12747
CONFIRM
vivotek — fd8136_firmware Vivotek FD8136 devices allow Remote Command Injection, related to BusyBox and wget. 2019-07-10 10.0 CVE-2018-14494
MISC
MISC
vivotek — fd8136_firmware Vivotek FD8136 devices allow Remote Command Injection, aka “another command injection vulnerability in our target device,” a different issue than CVE-2018-14494. 2019-07-10 10.0 CVE-2018-14495
MISC
MISC
vivotek — fd8136_firmware Vivotek FD8136 devices allow remote memory corruption and remote code execution because of a stack-based buffer overflow, related to sprintf, vlocal_buff_4326, and set_getparam.cgi. 2019-07-10 7.5 CVE-2018-14496
MISC
MISC
yoast — yoast_seo The Yoast SEO plugin before 11.6-RC5 for WordPress does not properly restrict unfiltered HTML in term descriptions. 2019-07-09 7.5 CVE-2019-13478
MISC

Back to top

 

Medium Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
alsa-project — alsa posix/JackSocket.cpp in libjack in JACK2 1.9.1 through 1.9.12 (as distributed with alsa-plugins 1.1.7 and later) has a “double file descriptor close” issue during a failed connection attempt when jackd2 is not running. Exploitation success depends on multithreaded timing of that double close, which can result in unintended information disclosure, crashes, or file corruption due to having the wrong file associated with the file descriptor. 2019-07-05 6.8 CVE-2019-13351
MISC
MISC
apachefriends — xampp iart.php in XAMPP 1.7.0 has XSS, a related issue to CVE-2008-3569. 2019-07-09 4.3 CVE-2019-8920
BID
MISC
cesanta — mongoose mq_parse_http in mongoose.c in Mongoose 6.15 has a heap-based buffer over-read. 2019-07-10 5.0 CVE-2019-13503
MISC
MISC
cisco — unified_communications_manager A vulnerability in the Session Initiation Protocol (SIP) protocol implementation of Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of input SIP traffic. An attacker could exploit this vulnerability by sending a malformed SIP packet to an affected Cisco Unified Communications Manager. A successful exploit could allow the attacker to trigger a new registration process on all connected phones, temporarily disrupting service. 2019-07-05 5.0 CVE-2019-1887
CISCO
codedoc_project — codedoc Codedoc v3.2 has a stack-based buffer overflow in add_variable in codedoc.c, related to codedoc_strlcpy. 2019-07-06 6.8 CVE-2019-13362
MISC
crudlab — wp_like_button An authentication bypass vulnerability in the CRUDLab WP Like Button plugin through 1.6.0 for WordPress allows unauthenticated attackers to change settings. The contains() function in wp_like_button.php did not check if the current request is made by an authorized user, thus allowing any unauthenticated user to successfully update settings, as demonstrated by the wp-admin/admin.php?page=facebook-like-button each_page_url or code_snippet parameter. 2019-07-05 5.0 CVE-2019-13344
MISC
MISC
MISC
custom4web — wp_open_graph Cross-site request forgery (CSRF) vulnerability in WP Open Graph 1.6.1 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. 2019-07-05 6.8 CVE-2019-5960
JVN
digisol — dg-hr-3300_firmware Digisol Wireless Wifi Home Router HR-3300 allows XSS via the userid or password parameter to the admin login page. 2019-07-05 4.3 CVE-2018-14027
MISC
dlink — central_wifimanager A cross-site scripting (XSS) vulnerability in resource view in PayAction.class.php in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 allows remote attackers to inject arbitrary web script or HTML via the index.php/Pay/passcodeAuth passcode parameter. 2019-07-06 4.3 CVE-2019-13374
MISC
CONFIRM
MISC
dlink — dir-655_firmware D-Link DIR-655 C devices before 3.02B05 BETA03 allow remote attackers to force a blank password via the apply_sec.cgi setup_wizard parameter. 2019-07-11 5.0 CVE-2019-13560
MISC
MISC
MISC
dlink — dir-655_firmware D-Link DIR-655 C devices before 3.02B05 BETA03 allow XSS, as demonstrated by the /www/ping_response.cgi ping_ipaddr parameter, the /www/ping6_response.cgi ping6_ipaddr parameter, and the /www/apply_sec.cgi html_response_return_page parameter. 2019-07-11 4.3 CVE-2019-13562
MISC
MISC
MISC
dlink — dir-655_firmware D-Link DIR-655 C devices before 3.02B05 BETA03 allow CSRF for the entire management console. 2019-07-11 6.8 CVE-2019-13563
MISC
MISC
MISC
dropbox — dropbox Dropbox.exe (and QtWebEngineProcess.exe in the Web Helper) in the Dropbox desktop application 71.4.108.0 store cleartext credentials in memory upon successful login or new account creation. These are not securely freed in the running process. 2019-07-08 4.3 CVE-2019-12171
MISC
MISC
dwbooster — appointment_hour_booking The Appointment Hour Booking plugin 1.1.44 for WordPress allows XSS via the E-mail field, as demonstrated by email_1. 2019-07-11 4.3 CVE-2019-13505
MISC
MISC
enhancesoft — osticket Unauthenticated Stored XSS in osTicket 1.10.1 allows a remote attacker to gain admin privileges by injecting arbitrary web script or HTML via arbitrary file extension while creating a support ticket. 2019-07-09 4.3 CVE-2019-13397
MISC
eventum_project — eventum An issue was discovered in Eventum 3.5.0. /htdocs/switch.php has an Open Redirect via the current_page parameter. 2019-07-05 5.8 CVE-2018-12621
MISC
CONFIRM
eventum_project — eventum An issue was discovered in Eventum 3.5.0. htdocs/ajax/update.php has XSS via the field_name parameter. 2019-07-10 4.3 CVE-2018-12622
MISC
CONFIRM
eventum_project — eventum An issue was discovered in Eventum 3.5.0. htdocs/switch.php has XSS via the current_page parameter. 2019-07-10 4.3 CVE-2018-12623
MISC
CONFIRM
eventum_project — eventum An issue was discovered in Eventum 3.5.0. /htdocs/validate.php has XSS via the values parameter. 2019-07-10 4.3 CVE-2018-12625
MISC
CONFIRM
eventum_project — eventum An issue was discovered in Eventum 3.5.0. /htdocs/popup.php has XSS via the cat parameter. 2019-07-10 4.3 CVE-2018-12626
MISC
CONFIRM
eventum_project — eventum An issue was discovered in Eventum 3.5.0. /htdocs/list.php has XSS via the show_notification_list_issues or show_authorized_issues parameter. 2019-07-10 4.3 CVE-2018-12627
MISC
CONFIRM
eventum_project — eventum An issue was discovered in Eventum 3.5.0. CSRF in htdocs/manage/users.php allows creating another user with admin privileges. 2019-07-10 6.8 CVE-2018-12628
MISC
CONFIRM
exiv2 — exiv2 There is an out-of-bounds read in Exiv2::MrwImage::readMetadata in mrwimage.cpp in Exiv2 through 0.27.2. 2019-07-10 4.3 CVE-2019-13504
BID
MISC
MISC
ffmpeg — ffmpeg In FFmpeg 4.1.3, there is a division by zero at adx_write_trailer in libavformat/rawenc.c. This may be related to two NULL pointers passed as arguments at libavcodec/frame_thread_encoder.c. 2019-07-07 4.3 CVE-2019-13390
BID
MISC
MISC
MISC
MISC
MISC
fla-shop — html5_maps Cross-site request forgery (CSRF) vulnerability in HTML5 Maps 1.6.5.6 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. 2019-07-05 6.8 CVE-2019-5983
MISC
MISC
MISC
flarum — flarum Flarum before 0.1.0-beta.9 allows CSRF against all POST endpoints, as demonstrated by changing admin settings. 2019-07-07 6.8 CVE-2019-13183
CONFIRM
MISC
CONFIRM
fortinet — fcm-mb40_firmware Dynacolor FCM-MB40 v1.2.0.0 devices have a hard-coded SSL/TLS key that is used during an administrator’s SSL conversation. 2019-07-07 4.3 CVE-2019-13399
MISC
fortinet — fcm-mb40_firmware Dynacolor FCM-MB40 v1.2.0.0 use /etc/appWeb/appweb.pass to store administrative web-interface credentials in cleartext. These credentials can be retrieved via cgi-bin/getuserinfo.cgi?mode=info. 2019-07-07 5.0 CVE-2019-13400
MISC
fortinet — fcm-mb40_firmware Dynacolor FCM-MB40 v1.2.0.0 devices have CSRF in all scripts under cgi-bin/. 2019-07-07 6.8 CVE-2019-13401
MISC
fortinet — fcm-mb40_firmware /usr/sbin/default.sh and /usr/apache/htdocs/cgi-bin/admin/hardfactorydefault.cgi on Dynacolor FCM-MB40 v1.2.0.0 devices implement an incomplete factory-reset process. A backdoor can persist because neither system accounts nor the set of services is reset. 2019-07-07 6.5 CVE-2019-13402
MISC
gitea — gitea Gitea 1.7.2, 1.7.3 is affected by: Cross Site Scripting (XSS). The impact is: execute JavaScript in victim’s browser, when the vulnerable repo page is loaded. The component is: repository’s description. The attack vector is: victim must navigate to public and affected repo page. 2019-07-11 4.3 CVE-2019-1010314
MISC
gitlab — gitlab An issue was discovered in GitLab Community and Enterprise Edition 11.x before 11.3.11, 11.4.x before 11.4.8, and 11.5.x before 11.5.1. There is a persistent XSS vulnerability in the environment pages due to a lack of input validation and output encoding. 2019-07-10 4.3 CVE-2018-19493
BID
CONFIRM
MISC
gitlab — gitlab An issue was discovered in GitLab Community and Enterprise Edition 11.x before 11.3.11, 11.4.x before 11.4.8, and 11.5.x before 11.5.1. There is an incorrect access vulnerability that allows an unauthorized user to view private group names. 2019-07-10 4.0 CVE-2018-19494
CONFIRM
MISC
gitlab — gitlab An issue was discovered in GitLab Community and Enterprise Edition before 11.3.11, 11.4.x before 11.4.8, and 11.5.x before 11.5.1. There is an SSRF vulnerability in the Prometheus integration. 2019-07-10 4.0 CVE-2018-19495
CONFIRM
MISC
gitlab — gitlab An issue was discovered in GitLab Community and Enterprise Edition 10.x and 11.x before 11.3.11, 11.4.x before 11.4.8, and 11.5.x before 11.5.1. There is an incorrect access control vulnerability that permits a user with insufficient privileges to promote a project milestone to a group milestone. 2019-07-10 4.0 CVE-2018-19496
CONFIRM
MISC
gitlab — gitlab GitLab CE/EE, versions 8.8 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an authorization vulnerability that allows access to the web-UI as a user using a Personal Access Token of any scope. 2019-07-10 6.5 CVE-2018-19569
BID
CONFIRM
MISC
gitlab — gitlab GitLab CE/EE, versions 8.18 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an SSRF vulnerability in webhooks. 2019-07-10 4.0 CVE-2018-19571
MISC
MISC
gitlab — gitlab GitLab CE 8.17 and later and EE 8.3 and later have a symlink time-of-check-to-time-of-use race condition that would allow unauthorized access to files in the GitLab Pages chroot environment. This is fixed in versions 11.5.1, 11.4.8, and 11.3.11. 2019-07-10 4.3 CVE-2018-19572
CONFIRM
MISC
gitlab — gitlab GitLab CE/EE, versions 10.1 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an insecure direct object reference issue that allows a user to make comments on a locked issue. 2019-07-10 4.0 CVE-2018-19575
BID
CONFIRM
MISC
gitlab — gitlab GitLab CE/EE, versions 8.6 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an access control issue that allows a Guest user to make changes to or delete their own comments on an issue, after the issue was made Confidential. 2019-07-10 6.4 CVE-2018-19576
MISC
MISC
gitlab — gitlab Gitlab CE/EE, versions 8.6 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an incorrect access control vulnerability that displays to an unauthorized user the title and namespace of a confidential issue. 2019-07-10 5.0 CVE-2018-19577
CONFIRM
MISC
gitlab — gitlab GitLab EE, version 11.5 before 11.5.1, is vulnerable to an insecure object reference issue that permits a user with Reporter privileges to view the Jaeger Tracing Operations page. 2019-07-10 4.0 CVE-2018-19578
CONFIRM
MISC
gitlab — gitlab All versions of GitLab prior to 11.5.1, 11.4.8, and 11.3.11 do not send an email to the old email address when an email address change is made. 2019-07-10 5.0 CVE-2018-19580
CONFIRM
MISC
gitlab — gitlab GitLab EE, versions 8.3 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, is vulnerable to an insecure object reference vulnerability that allows a Guest user to set the weight of an issue they create. 2019-07-10 5.0 CVE-2018-19581
CONFIRM
MISC
gitlab — gitlab GitLab EE, versions 11.4 before 11.4.8 and 11.5 before 11.5.1, is affected by an insecure direct object reference vulnerability that permits an unauthorized user to publish the draft merge request comments of another user. 2019-07-10 4.0 CVE-2018-19582
CONFIRM
MISC
gitlab — gitlab GitLab CE/EE, versions 8.0 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, would log access tokens in the Workhorse logs, permitting administrators with access to the logs to see another user’s token. 2019-07-10 4.0 CVE-2018-19583
CONFIRM
MISC
gitlab — gitlab GitLab EE, versions 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, is vulnerable to an insecure direct object reference vulnerability that allows authenticated, but unauthorized, users to view members and milestone details of private groups. 2019-07-10 5.0 CVE-2018-19584
CONFIRM
MISC
google — android In FileInputStream::Read of file_input_stream.cc, there is a possible memory corruption due to uninitialized data. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-116114182. 2019-07-08 6.8 CVE-2019-2105
CONFIRM
google — android In save_attr_seq of sdp_discovery.cc, there is a possible out-of-bound read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-117105007. 2019-07-08 5.0 CVE-2019-2116
CONFIRM
helpy.io — helpy Helpy before 2.2.0 allows agents to edit admins. 2019-07-10 6.5 CVE-2018-20851
MISC
MISC
ibm — cloud_application_performance_management IBM Application Performance Management (IBM Monitoring 8.1.4) could allow a remote attacker to induce the application to perform server-side DNS lookups of arbitrary domain names. IBM X-Force ID: 158270. 2019-07-11 5.0 CVE-2019-4131
XF
CONFIRM
ibm — jazz_for_service_management IBM Jazz for Service Management 1.1.3 and 1.1.3.2 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-force ID: 159032. 2019-07-11 5.0 CVE-2019-4193
CONFIRM
XF
idoors — idoors_reader iDoors Reader 2.10.17 and earlier allows an attacker on the same network segment to bypass authentication to access the management console and operate the product via unspecified vectors. 2019-07-05 5.8 CVE-2019-5964
MISC
MISC
ignitedcms_project — ignitedcms index.php/admin/permissions in Ignited CMS through 2017-02-19 allows CSRF to add an administrator. 2019-07-06 6.8 CVE-2019-13370
MISC
imagemagick — imagemagick In ImageMagick 7.0.8-50 Q16, ComplexImages in MagickCore/fourier.c has a heap-based buffer over-read because of incorrect calls to GetCacheViewVirtualPixels. 2019-07-07 6.8 CVE-2019-13391
MISC
MISC
MISC
imagemagick — imagemagick ImageMagick 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c. 2019-07-09 4.3 CVE-2019-13454
BID
MISC
MISC
MISC
intersystems — cache Intersystems Cache 2017.2.2.865.0 allows XSS. 2019-07-11 4.3 CVE-2018-17150
MISC
intersystems — cache Intersystems Cache 2017.2.2.865.0 has Incorrect Access Control. 2019-07-11 5.5 CVE-2018-17151
MISC
intersystems — cache Intersystems Cache 2017.2.2.865.0 allows XXE. 2019-07-11 5.5 CVE-2018-17152
MISC
invoxia — nvx220_firmware Invoxia NVX220 devices allow access to /bin/sh via escape from a restricted CLI, leading to disclosure of password hashes. 2019-07-05 5.0 CVE-2018-14529
MISC
joruri — joruri_cms_2017 Cross-site scripting vulnerability in Joruri CMS 2017 Release2 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. 2019-07-05 4.3 CVE-2019-5967
MISC
MISC
joruri — joruri_mail Open redirect vulnerability in Joruri Mail 2.1.4 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. 2019-07-05 5.8 CVE-2019-5965
MISC
MISC
joruri — joruri_mail Joruri Mail 2.1.4 and earlier does not properly manage sessions, which allows remote attackers to impersonate an arbitrary user and alter/disclose the information via unspecified vectors. 2019-07-05 5.8 CVE-2019-5966
MISC
MISC
keynto — team_password_manager KEYNTO Team Password Manager 1.5.0 allows XSS because data saved from websites is mishandled in the online vault. 2019-07-09 4.3 CVE-2019-13380
FULLDISC
libpng — libpng An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png. 2019-07-10 6.8 CVE-2018-14550
MISC
MISC
mailvelope — mailvelope Mailvelope prior to 3.1.0 is vulnerable to a clickjacking attack against the settings page. As the settings page is intended to be accessible from web applications, the browser’s extension isolation mechanisms are disabled (web_accessible_resources). Mailvelope implements additional measures to prevent web applications from directly embedding the settings page, but this mechanism can be bypassed. 2019-07-09 4.3 CVE-2019-9147
CONFIRM
mailvelope — mailvelope Mailvelope prior to 3.3.0 accepts or operates with invalid PGP public keys: Mailvelope allows importing keys that contain users without a valid self-certification. Keys that are obviously invalid are not rejected during import. An attacker that is able to get a victim to import a manipulated key could claim to have signed a message that originates from another person. 2019-07-09 4.3 CVE-2019-9148
CONFIRM
mailvelope — mailvelope Mailvelope prior to 3.3.0 allows private key operations without user interaction via its client-API. By modifying an URL parameter in Mailvelope, an attacker is able to sign (and encrypt) arbitrary messages with Mailvelope, assuming the private key password is cached. A second vulnerability allows an attacker to decrypt an arbitrary message when the GnuPG backend is used in Mailvelope. 2019-07-09 6.4 CVE-2019-9149
CONFIRM
mailvelope — mailvelope Mailvelope prior to 3.3.0 does not require user interaction to import public keys shown on web page. This functionality can be tricked to either hide a key import from the user or obscure which key was imported. 2019-07-09 5.0 CVE-2019-9150
CONFIRM
mastodon-tootdon — tootdon_for_mastodon The Android App ‘Tootdon for Mastodon’ version 3.4.1 and earlier does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. 2019-07-05 5.8 CVE-2019-5961
MISC
MISC
mediawiki — mediawiki Wikimedia MediaWiki through 1.32.1 allows CSRF. 2019-07-10 6.8 CVE-2019-12466
CONFIRM
MISC
BUGTRAQ
DEBIAN
mediawiki — mediawiki Wikimedia MediaWiki 1.23.0 through 1.32.1 has an information leak. Privileged API responses that include whether a recent change has been patrolled may be cached publicly. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6. 2019-07-10 5.0 CVE-2019-12474
CONFIRM
MISC
BUGTRAQ
DEBIAN
odoo — odoo The Odoo Community Association (OCA) dbfilter_from_header module makes Odoo 8.x, 9.x, 10.x, and 11.x vulnerable to ReDoS (regular expression denial of service) under certain circumstances. 2019-07-05 5.0 CVE-2018-14733
CONFIRM
MISC
MISC
MISC
MISC
oniguruma_project — oniguruma A NULL Pointer Dereference in match_at() in regexec.c in Oniguruma 6.9.2 allows attackers to potentially cause denial of service by providing a crafted regular expression. Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust. 2019-07-10 5.0 CVE-2019-13225
CONFIRM
opencats — opencats lib/DocumentToText.php in OpenCats before 0.9.4-3 has XXE that allows remote users to read files on the underlying operating system. The attacker must upload a file in the docx or odt format. 2019-07-05 4.3 CVE-2019-13358
MISC
MISC
MISC
otrs — otrs An issue was discovered in Open Ticket Request System (OTRS) 6.0.x through 6.0.7. A carefully constructed email could be used to inject and execute arbitrary stylesheet or JavaScript code in a logged in customer’s browser in the context of the OTRS customer panel application. 2019-07-08 4.9 CVE-2018-11563
CONFIRM
CONFIRM
MISC
paypal — adaptive_payments_sdk paypal/adaptivepayments-sdk-php v3.9.2 is vulnerable to a reflected XSS in the SetPaymentOptions.php resulting code execution 2019-07-10 4.3 CVE-2017-6217
MISC
phpwind — phpwind PHPWind 9.1.0 has XSS vulnerabilities in the c and m parameters of the index.php file. 2019-07-09 4.3 CVE-2019-13472
MISC
pingidentity — agentless_integration_kit XSS exists in Ping Identity Agentless Integration Kit before 1.5. 2019-07-11 4.3 CVE-2019-13564
CONFIRM
pyxtrlock_project — pyxtrlock pyxtrlock 0.3 and earlier is affected by: Incorrect Access Control. The impact is: False locking impression when run in a non-X11 session. The fixed version is: 0.4. 2019-07-11 4.6 CVE-2019-1010316
MISC
sap — information_steward SAP Information Steward, version 4.2, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. 2019-07-10 4.3 CVE-2019-0329
BID
MISC
CONFIRM
sony — vaio_update Improper authorization vulnerability in VAIO Update 7.3.0.03150 and earlier allows an attackers to execute arbitrary executable file with administrative privilege via unspecified vectors. 2019-07-05 6.8 CVE-2019-5981
MISC
MISC
sony — vaio_update Improper download file verification vulnerability in VAIO Update 7.3.0.03150 and earlier allows remote attackers to conduct a man-in-the-middle attack via a malicous wireless LAN access point. A successful exploitation may result in a malicious file being downloaded/executed. 2019-07-05 5.4 CVE-2019-5982
MISC
MISC
squid-cache — squid The cachemgr.cgi web module of Squid through 4.7 has XSS via the user_name or auth parameter. 2019-07-05 4.3 CVE-2019-13345
MISC
MISC
MLIST
sukimalab — attendance_manager Cross-site scripting vulnerability in Attendance Manager 0.5.6 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. 2019-07-05 4.3 CVE-2019-5970
MISC
MISC
MISC
MISC
sukimalab — attendance_manager Cross-site request forgery (CSRF) vulnerability in Attendance Manager 0.5.6 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. 2019-07-05 6.8 CVE-2019-5971
MISC
MISC
MISC
MISC
sukimalab — online_lesson_booking Cross-site scripting vulnerability in Online Lesson Booking 0.8.6 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. 2019-07-05 4.3 CVE-2019-5972
MISC
MISC
MISC
teclib-edition — fields An issue was discovered in the Teclib News plugin through 1.5.2 for GLPI. It allows a stored XSS attack via the $_POST[‘name’] parameter. 2019-07-10 4.3 CVE-2019-12724
MISC
MISC
CONFIRM
trape_project — trape A cross-site scripting (XSS) vulnerability in static/js/trape.js in Trape through 2019-05-08 allows remote attackers to inject arbitrary web script or HTML via the country, query, or refer parameter to the /register URI, because the jQuery prepend() method is used. 2019-07-10 4.3 CVE-2019-13488
MISC
typo3 — typo3 TYPO3 8.3.0 through 8.7.26 and 9.0.0 through 9.5.7 allows XSS. 2019-07-09 4.3 CVE-2019-12748
CONFIRM
waspthemes — custom_css_pro Cross-site request forgery (CSRF) vulnerability in Custom CSS Pro 1.0.3 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. 2019-07-05 6.8 CVE-2019-5984
MISC
MISC
MISC
weseek — growi Cross-site request forgery (CSRF) vulnerability in GROWI v3.4.6 and earlier allows remote attackers to hijack the authentication of administrators via updating user’s ‘Basic Info’. 2019-07-05 6.8 CVE-2019-5968
MISC
MISC
weseek — growi Open redirect vulnerability in GROWI v3.4.6 and earlier allows remote attackersto redirect users to arbitrary web sites and conduct phishing attacks via the process of login. 2019-07-05 5.8 CVE-2019-5969
MISC
MISC
wikindx_project — wikindx A cross-site scripting (XSS) vulnerability in noMenu() and noSubMenu() in core/navigation/MENU.php in WIKINDX prior to version 5.8.1 allows remote attackers to inject arbitrary web script or HTML via the method parameter. 2019-07-08 4.3 CVE-2019-12930
CONFIRM
CONFIRM
CONFIRM
zoho — salesiq Cross-site scripting vulnerability in Zoho SalesIQ 1.0.8 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. 2019-07-05 4.3 CVE-2019-5962
MISC
MISC
zoho — salesiq Cross-site request forgery (CSRF) vulnerability in Zoho SalesIQ 1.0.8 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. 2019-07-05 6.8 CVE-2019-5963
MISC
MISC
zohocorp — manageengine_assetexplorer An issue was discovered in Zoho ManageEngine AssetExplorer. There is XSS via the RCSettings.do rdsName parameter. 2019-07-11 4.3 CVE-2019-12595
MISC
MISC
zohocorp — manageengine_assetexplorer An issue was discovered in Zoho ManageEngine AssetExplorer. There is XSS via SoftwareListView.do with the parameter swType or swComplianceType. 2019-07-11 4.3 CVE-2019-12596
MISC
MISC
zohocorp — manageengine_assetexplorer An issue was discovered in Zoho ManageEngine AssetExplorer. There is XSS via ResourcesAttachments.jsp with the parameter pageName. 2019-07-11 4.3 CVE-2019-12597
MISC
MISC
zohocorp — manageengine_servicedesk_plus An issue was discovered in the Purchase component of Zoho ManageEngine ServiceDesk Plus. There is XSS via the SearchN.do search field, a different vulnerability than CVE-2019-12189. 2019-07-11 4.3 CVE-2019-12539
MISC
MISC

Back to top

 

Low Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
1234n — minicms In MiniCMS V1.10, stored XSS was found in mc-admin/page-edit.php (content box), which can be used to get a user’s cookie. 2019-07-05 3.5 CVE-2019-13339
MISC
1234n — minicms In MiniCMS V1.10, stored XSS was found in mc-admin/post-edit.php via the content box. An attacker can use it to get a user’s cookie. This is different from CVE-2018-10296, CVE-2018-16233, CVE-2018-20520, and CVE-2019-13186. 2019-07-05 3.5 CVE-2019-13340
MISC
1234n — minicms In MiniCMS V1.10, stored XSS was found in mc-admin/conf.php (comment box), which can be used to get a user’s cookie. 2019-07-05 3.5 CVE-2019-13341
MISC
cyberpowersystems — powerpanel A stored XSS vulnerability in the Agent/Center component of CyberPower PowerPanel Business Edition 3.4.0 allows a privileged attacker to embed malicious JavaScript in the SNMP trap receivers form. Upon visiting the /agent/action_recipient Event Action/Recipient page, the embedded code will be executed in the browser of the victim. 2019-07-09 3.5 CVE-2019-13070
MISC
MISC
gitlab — gitlab GitLab CE/EE, versions 11.3 before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an XSS vulnerability in Markdown fields via unrecognized HTML tags. 2019-07-10 3.5 CVE-2018-19570
CONFIRM
MISC
gitlab — gitlab GitLab CE/EE, versions 10.3 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an XSS vulnerability in Markdown fields via Mermaid. 2019-07-10 3.5 CVE-2018-19573
CONFIRM
MISC
gitlab — gitlab GitLab CE/EE, versions 7.6 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an XSS vulnerability in the OAuth authorization page. 2019-07-10 3.5 CVE-2018-19574
MISC
MISC
gitlab — gitlab GitLab EE version 11.5 is vulnerable to a persistent XSS vulnerability in the Operations page. This is fixed in 11.5.1. 2019-07-10 3.5 CVE-2018-19579
CONFIRM
MISC
google — android In HIDL, safe_union, and other C++ structs/unions being sent to application processes, there are uninitialized fields. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-8.0 Android-8.1 Android-9. Android ID: A-131356202 2019-07-08 2.1 CVE-2019-2104
CONFIRM
google — android In setup wizard there is a bypass of some checks when wifi connection is skipped. This could lead to factory reset protection bypass with no additional privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-122597079. 2019-07-08 2.1 CVE-2019-2113
CONFIRM
google — android In checkQueryPermission of TelephonyProvider.java, there is a possible disclosure of secure data due to a missing permission check. This could lead to local information disclosure about carrier systems with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-124107808. 2019-07-08 2.1 CVE-2019-2117
CONFIRM
google — android In various functions of Parcel.cpp, there are uninitialized or partially initialized stack variables. These could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-8.0 Android-8.1 Android-9. Android ID: A-130161842. 2019-07-08 2.1 CVE-2019-2118
CONFIRM
google — android In multiple functions of key_store_service.cpp, there is a possible Information Disclosure due to improper locking. This could lead to local information disclosure of protected data with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-8.0 Android-8.1 Android-9. Android ID: A-131622568. 2019-07-08 2.1 CVE-2019-2119
CONFIRM
ibm — multicloud_manager IBM Multicloud Manager 3.1.0, 3.1.1, and 3.1.2 ibm-mcm-chart could allow a local attacker with admin privileges to obtain highly sensitive information upon deployment. IBM X-Force ID: 158144. 2019-07-11 2.1 CVE-2019-4118
CONFIRM
XF
libosinfo — libosinfo libosinfo 1.5.0 allows local users to discover credentials by listing a process, because credentials are passed to osinfo-install-script via the command line. 2019-07-05 2.1 CVE-2019-13313
MLIST
MISC
MISC
MISC
MISC
nagios — nagios_xi Nagios XI before 5.5.4 has XSS in the auto login admin management page. 2019-07-10 3.5 CVE-2018-17147
BID
MISC
redhat — virt-bootstrap virt-bootstrap 1.1.0 allows local users to discover a root password by listing a process, because this password may be present in the –root-password option to virt_bootstrap.py. 2019-07-05 2.1 CVE-2019-13314
MLIST
MISC
MISC

Back to top

 

Severity Not Yet Assigned

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
alarm.com — adc-v522ir_devices Alarm.com ADC-V522IR 0100b9 devices have Incorrect Access Control, a different issue than CVE-2018-19588. This occurs because of incorrect protection of VPN certificates (used for initiating a VPN session to the Alarm.com infrastructure) on the local camera device. 2019-07-11 not yet calculated CVE-2019-9657
MISC
alarm.com — adc-v522ir_devices Alarm.com ADC-V522IR 0100b9 devices have Incorrect Access Control. 2019-07-11 not yet calculated CVE-2018-19588
MISC
apache — kafka In Apache Kafka versions between 0.11.0.0 and 2.1.0, it is possible to manually craft a Produce request which bypasses transaction/idempotent ACL validation. Only authenticated clients with Write permission on the respective topics are able to exploit this vulnerability. Users should upgrade to 2.1.1 or later where this vulnerability has been fixed. 2019-07-11 not yet calculated CVE-2018-17196
MISC
apple — macos hide.me before 2.4.4 on macOS suffers from a privilege escalation vulnerability in the connectWithExecutablePath:configFilePath:configFileName method of the me_hide_vpnhelper.Helper class in the me.hide.vpnhelper macOS privilege helper tool. This method takes user-supplied input and can be used to escalate privileges, as well as obtain the ability to run any application on the system in the root context. 2019-07-08 not yet calculated CVE-2019-12174
MISC
arlo — basestation Arlo Basestation firmware 1.12.0.1_27940 and prior contain a hardcoded username and password combination that allows root access to the device when an onboard serial interface is connected to. 2019-07-09 not yet calculated CVE-2019-3950
CONFIRM
arlo — basestation Arlo Basestation firmware 1.12.0.1_27940 and prior firmware contain a networking misconfiguration that allows access to restricted network interfaces. This could allow an attacker to upload or download arbitrary files and possibly execute malicious code on the device. 2019-07-09 not yet calculated CVE-2019-3949
CONFIRM
avaya — control_manager  A SQL injection vulnerability in the reporting component of Avaya Control Manager could allow an unauthenticated attacker to execute arbitrary SQL commands and retrieve sensitive data related to other users on the system. Affected versions of Avaya Control Manager include 7.x and 8.0.x versions prior to 8.0.4.0. Unsupported versions not listed here were not evaluated. 2019-07-11 not yet calculated CVE-2019-7003
BID
CONFIRM
avtech — room_alert_3e On AVTECH Room Alert 3E devices before 2.2.5, an attacker with access to the device’s web interface may escalate privileges from an unauthenticated user to administrator by performing a cmd.cgi?action=ResetDefaults&src=RA reset and using the default credentials to get in. 2019-07-07 not yet calculated CVE-2019-13379
MISC
MISC
bks — bks_ebk_ethernet-buskoppler_pro BKS EBK Ethernet-Buskoppler Pro before 3.01 allows Unrestricted Upload of a File with a Dangerous Type. 2019-07-05 not yet calculated CVE-2019-12971
MISC
blackberry — qnx_software_development_platform An information disclosure vulnerability leading to a potential local escalation of privilege in the procfs service (the /proc filesystem) of BlackBerry QNX Software Development Platform version(s) 6.5.0 SP1 and earlier could allow an attacker to potentially gain unauthorized access to a chosen process address space. 2019-07-12 not yet calculated CVE-2019-8998
MISC
broadlearning — eclass Any URLs with download_attachment.php under templates or home folders can allow arbitrary files downloaded without login in BroadLearning eClass before version ip.2.5.10.2.1. 2019-07-11 not yet calculated CVE-2019-9886
CONFIRM
CONFIRM
CONFIRM
castle_rock_computing — snmpc nodeimp.exe in Castle Rock SNMPc before 9.0.12.1 and 10.x before 10.0.9 has a stack-based buffer overflow via a long variable string in a Map Objects text file. 2019-07-12 not yet calculated CVE-2019-13494
MISC
MISC

cisco — adaptive_security_applicance_software_and_firepower_threat_defense_software

 

A vulnerability in the cryptographic driver for Cisco Adaptive Security Appliance Software (ASA) and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reboot unexpectedly. The vulnerability is due to incomplete input validation of a Secure Sockets Layer (SSL) or Transport Layer Security (TLS) ingress packet header. An attacker could exploit this vulnerability by sending a crafted TLS/SSL packet to an interface on the targeted device. An exploit could allow the attacker to cause the device to reload, which will result in a denial of service (DoS) condition. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed and transparent firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. A valid SSL or TLS session is required to exploit this vulnerability. 2019-07-10 not yet calculated CVE-2019-1873
BID
CISCO
cisco — advanced_malware_protection_for_endpoints_for_windows A vulnerability in Cisco Advanced Malware Protection (AMP) for Endpoints for Windows could allow an authenticated, local attacker with administrator privileges to execute arbitrary code. The vulnerability is due to insufficient validation of dynamically loaded modules. An attacker could exploit this vulnerability by placing a file in a specific location in the Windows filesystem. A successful exploit could allow the attacker to execute the code with the privileges of the AMP service. 2019-07-05 not yet calculated CVE-2019-1932
CISCO
cisco — email_security_appliance A vulnerability in the attachment scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured content filters on the device. The vulnerability is due to improper input validation of the email body. An attacker could exploit this vulnerability by naming a malicious attachment with a specific pattern. A successful exploit could allow the attacker to bypass configured content filters that would normally block the attachment. 2019-07-05 not yet calculated CVE-2019-1921
CISCO
cisco — email_security_appliance A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured filters on the device. The vulnerability is due to improper input validation of certain email fields. An attacker could exploit this vulnerability by sending a crafted email message to a recipient protected by the ESA. A successful exploit could allow the attacker to bypass configured message filters and inject arbitrary scripting code inside the email body. The malicious code is not executed by default unless the recipient’s email client is configured to execute scripts contained in emails. 2019-07-05 not yet calculated CVE-2019-1933
CISCO
cisco — enterprise_nfv_infrastructure_software A vulnerability in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker with administrator privileges to overwrite or read arbitrary files on the underlying operating system (OS) of an affected device. The vulnerability is due to improper input validation in NFVIS filesystem commands. An attacker could exploit this vulnerability by using crafted variables during the execution of an affected command. A successful exploit could allow the attacker to overwrite or read arbitrary files on the underlying OS. 2019-07-05 not yet calculated CVE-2019-1894
CISCO
cisco — enterprise_nfv_infrastructure_software A vulnerability in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device as root. The vulnerability is due to insufficient input validation of a configuration file that is accessible to a local shell user. An attacker could exploit this vulnerability by including malicious input during the execution of this file. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS as root. 2019-07-05 not yet calculated CVE-2019-1893
CISCO
cisco — firepower_management_center Multiple vulnerabilities in the RSS dashboard in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. 2019-07-05 not yet calculated CVE-2019-1931
CISCO
cisco — firepower_management_center Multiple vulnerabilities in the RSS dashboard in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. 2019-07-05 not yet calculated CVE-2019-1930
CISCO
cisco — ios_xr_software A vulnerability in the implementation of Border Gateway Protocol (BGP) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected system. The vulnerability is due to incorrect processing of certain BGP update messages. An attacker could exploit this vulnerability by sending BGP update messages that include a specific set of attributes to be processed by an affected system. A successful exploit could allow the attacker to cause the BGP process to restart unexpectedly, resulting in a DoS condition. The Cisco implementation of BGP accepts incoming BGP traffic from explicitly defined peers only. To exploit this vulnerability, the malicious BGP update message would need to come from a configured, valid BGP peer or would need to be injected by the attacker into the victim’s BGP network on an existing, valid TCP connection to a BGP peer. 2019-07-05 not yet calculated CVE-2019-1909
CISCO
cisco — ip_phone_7800_series_and_8800_series A vulnerability in Cisco SIP IP Phone Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected phone. The vulnerability is due to insufficient validation of input Session Initiation Protocol (SIP) packets. An attacker could exploit this vulnerability by altering the SIP replies that are sent to the affected phone during the registration process. A successful exploit could allow the attacker to cause the phone to reboot and not complete the registration process. 2019-07-05 not yet calculated CVE-2019-1922
CISCO
cisco — small_business_200_and_300_and_500_series_managed_switches A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition. 2019-07-05 not yet calculated CVE-2019-1892
CISCO
cisco — small_business_200_and_300_and_500_series_managed_switches A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. 2019-07-05 not yet calculated CVE-2019-1891
CISCO
cisco — unified_communications_domain_manager A vulnerability in the CLI of Cisco Unified Communications Domain Manager (Cisco Unified CDM) Software could allow an authenticated, local attacker to escape the restricted shell. The vulnerability is due to insufficient input validation of shell commands. An attacker could exploit this vulnerability by executing crafted commands in the shell. A successful exploit could allow the attacker to escape the restricted shell and access commands in the context of the restricted shell user, which does not have root privileges. 2019-07-05 not yet calculated CVE-2019-1911
CISCO
citrix — xenserver The Windows Guest Tools in Citrix XenServer 6.2 SP1 and earlier allows remote attackers to cause a denial of service (guest OS crash) via a crafted Ethernet frame. 2019-07-11 not yet calculated CVE-2014-3798
SECUNIA
CONFIRM
BID
SECTRACK
cloud_foundry — uaa Cloud Foundry UAA version prior to 73.3.0, contain endpoints that contains improper escaping. An authenticated malicious user with basic read privileges for one identity zone can extend those reading privileges to all other identity zones and obtain private information on users, clients, and groups in all other identity zones. 2019-07-11 not yet calculated CVE-2019-11268
CONFIRM
cloudera — cloudera_manager Cloudera Manager through 5.15 has Incorrect Access Control. 2019-07-11 not yet calculated CVE-2018-11744
CONFIRM
MISC
cohesity — dataplatform A man-in-the-middle vulnerability related to vCenter access was found in Cohesity DataPlatform version 5.x and 6.x prior to 6.1.1c. Cohesity clusters did not verify TLS certificates presented by vCenter. This vulnerability could expose Cohesity user credentials configured to access vCenter. 2019-07-12 not yet calculated CVE-2019-11242
CONFIRM
container_build_system — osbs-client A flaw was found in the yaml.load() function in the osbs-client versions since 0.46 before 0.56.1. Insecure use of the yaml.load() function allowed the user to load any suspicious object for code execution via the parsing of malicious YAML files. 2019-07-11 not yet calculated CVE-2019-10135
CONFIRM
CONFIRM
cyberpower — powerpanel_business CSRF in the Agent/Center component of CyberPower PowerPanel Business Edition 3.4.0 allows an attacker to submit POST requests to any forms in the web application. This can be exploited by tricking an authenticated user into visiting an attacker controlled web page. 2019-07-10 not yet calculated CVE-2019-13071
MISC
FULLDISC
damicms — damicms An arbitrary file read vulnerability in DamiCMS v6.0.0 allows remote authenticated administrators to read any files in the server via a crafted /admin.php?s=Tpl/Add/id/ URI. 2019-07-10 not yet calculated CVE-2018-14831
MISC
ddrt — dashcom_live Lack of authentication in file-viewing components in DDRT Dashcom Live 2019-05-09 allows anyone to remotely access all claim details by visiting easily guessable dashboard/uploads/claim_files/claim_id_ URLs. 2019-07-09 not yet calculated CVE-2019-11020
MISC
MISC
ddrt — dashcom_live Lack of authentication in case-exporting components in DDRT Dashcom Live through 2019-05-08 allows anyone to remotely access all claim details by visiting easily guessable exportpdf/all_claim_detail.php?claim_id= URLs. 2019-07-09 not yet calculated CVE-2019-11019
MISC
MISC
debian — mediawiki An Incorrect Access Control vulnerability was found in Wikimedia MediaWiki 1.18.0 through 1.32.1. It is possible to bypass the limits on IP range blocks ($wgBlockCIDRLimit) by using the API. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6. 2019-07-10 not yet calculated CVE-2019-12472
CONFIRM
MISC
debian — mediawiki An Incorrect Access Control vulnerability was found in Wikimedia MediaWiki 1.27.0 through 1.32.1. Directly POSTing to Special:ChangeEmail would allow for bypassing re-authentication, allowing for potential account takeover. 2019-07-10 not yet calculated CVE-2019-12468
MISC
CONFIRM
MISC
BUGTRAQ
DEBIAN
debian — mediawiki MediaWiki through 1.32.1 has Incorrect Access Control (issue 1 of 3). A spammer can use Special:ChangeEmail to send out spam with no rate limiting or ability to block them. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6. 2019-07-10 not yet calculated CVE-2019-12467
CONFIRM
MISC
BUGTRAQ
DEBIAN
debian — mediawiki Wikimedia MediaWiki 1.30.0 through 1.32.1 has XSS. Loading user JavaScript from a non-existent account allows anyone to create the account, and perform XSS on users loading that script. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6. 2019-07-10 not yet calculated CVE-2019-12471
CONFIRM
MISC
BUGTRAQ
DEBIAN
debian — mediawiki Wikimedia MediaWiki 1.27.0 through 1.32.1 might allow DoS. Passing invalid titles to the API could cause a DoS by querying the entire watchlist table. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6. 2019-07-10 not yet calculated CVE-2019-12473
CONFIRM
MISC
BUGTRAQ
DEBIAN
debian — mediawiki Wikimedia MediaWiki through 1.32.1 has Incorrect Access Control. Suppressed log in RevisionDelete page is exposed. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6. 2019-07-10 not yet calculated CVE-2019-12470
CONFIRM
MISC
BUGTRAQ
DEBIAN
debian — mediawiki MediaWiki through 1.32.1 has Incorrect Access Control. Suppressed username or log in Special:EditTags are exposed. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6. 2019-07-10 not yet calculated CVE-2019-12469
CONFIRM
MISC
BUGTRAQ
DEBIAN
debian — redis A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer. 2019-07-11 not yet calculated CVE-2019-10193
CONFIRM
MISC
MISC
MISC
BUGTRAQ
DEBIAN
debian — redis A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer. 2019-07-11 not yet calculated CVE-2019-10192
CONFIRM
MISC
MISC
MISC
BUGTRAQ
DEBIAN
digium — asterisk Buffer overflow in res_pjsip_messaging in Digium Asterisk versions 13.21-cert3, 13.27.0, 15.7.2, 16.4.0 and earlier allows remote authenticated users to crash Asterisk by sending a specially crafted SIP MESSAGE message. 2019-07-12 not yet calculated CVE-2019-12827
CONFIRM
CONFIRM
digium — asterisk An issue was discovered in Asterisk Open Source through 13.27.0, 14.x and 15.x through 15.7.2, and 16.x through 16.4.0, and Certified Asterisk through 13.21-cert3. A pointer dereference in chan_sip while handling SDP negotiation allows an attacker to crash Asterisk when handling an SDP answer to an outgoing T.38 re-invite. To exploit this vulnerability an attacker must cause the chan_sip module to send a T.38 re-invite request to them. Upon receipt, the attacker must send an SDP answer containing both a T.38 UDPTL stream and another media stream containing only a codec (which is not permitted according to the chan_sip configuration). 2019-07-12 not yet calculated CVE-2019-13161
CONFIRM
CONFIRM
e107 — e107 In e107 v2.1.7, output without filtering results in XSS. 2019-07-10 not yet calculated CVE-2018-11734
MISC
eq-3 — homematic_ccu2_devices eQ-3 HomeMatic CCU2 devices before 2.41.9 and CCU3 devices before 3.43.16 have buffer overflows in the ReGa ise GmbH HTTP-Server 2.0 component, aka HMCCU-179. This may lead to remote code execution. 2019-07-10 not yet calculated CVE-2019-10122
MISC
MISC
eq-3 — homematic_ccu2_devices eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.16 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via an invalid login attempt to the RemoteApi account, aka HMCCU-154. This leads to automatic login as admin. 2019-07-10 not yet calculated CVE-2019-10119
MISC
MISC
eq-3 — homematic_ccu2_devices On eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.16, automatic login configuration (aka setAutoLogin) can be achieved by continuing to use a session ID after a logout, aka HMCCU-154. 2019-07-10 not yet calculated CVE-2019-10120
MISC
MISC
eq-3 — homematic_ccu2_devices eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.15 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via the user authentication dialogue, aka HMCCU-153. This leads to automatic login as admin. 2019-07-10 not yet calculated CVE-2019-10121
MISC
MISC
MISC
fasterxml — jackson-databind An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6. 2019-07-09 not yet calculated CVE-2018-11307
CONFIRM
MISC
MISC
MISC
field_test_gem_for_ruby_on_rails — field_test_gem_for_ruby_on_rails The field_test gem 0.3.0 for Ruby has unvalidated input. A method call that is expected to return a value from a certain set of inputs can be made to return any input, which can be dangerous depending on how applications use it. If an application treats arbitrary variants as trusted, this can lead to a variety of potential vulnerabilities like SQL injection or cross-site scripting (XSS). 2019-07-09 not yet calculated CVE-2019-13146
BID
MISC
MISC
flightpath — flightpath FlightPath 4.x and 5.0-x allows directory traversal and Local File Inclusion through the form_include parameter in an index.php?q=system-handle-form-submit POST request because of an include_once in system_handle_form_submit in modules/system/system.module. 2019-07-10 not yet calculated CVE-2019-13396
CONFIRM
ge_healthcare — aestiva_and_aespire In GE Aestiva and Aespire versions 7100 and 7900, a vulnerability exists where serial devices are connected via an added unsecured terminal server to a TCP/IP network configuration, which could allow an attacker to remotely modify device configuration and silence alarms. 2019-07-10 not yet calculated CVE-2019-10966
BID
MISC
glpi_project — glpi GLPI GLPI Product 9.3.1 is affected by: Frame and Form tags Injection allowing admins to phish users by putting code in reminder description. The impact is: Admins can phish any user or group of users for credentials / credit cards. The component is: Tools > Reminder > Description .. Set the description to any iframe/form tags and apply. The attack vector is: The attacker puts a login form, the user fills it and clicks on submit .. the request is sent to the attacker domain saving the data. The fixed version is: 9.4.1. 2019-07-12 not yet calculated CVE-2019-1010310
MISC
MISC
glpi_project — glpi An issue was discovered in GLPI before 9.4.1. After a successful password reset by a user, it is possible to change that user’s password again during the next 24 hours without any information except the associated email address. 2019-07-10 not yet calculated CVE-2019-13240
MISC
MISC
MISC
MISC
MISC
hewlett_packard_enterprise — 3par_service_processor HPE has identified a vulnerability in HPE 3PAR Service Processor (SP) version 4.1 through 4.4. HPE 3PAR Service Processor (SP) version 4.1 through 4.4 has a remote information disclosure vulnerability which can allow for the disruption of the confidentiality, integrity and availability of the Service Processor and any managed 3PAR arrays. 2019-07-09 not yet calculated CVE-2019-11991
CONFIRM
huawei — mate_20_and_mate_20_X_honor_magic_2 There is a Factory Reset Protection (FRP) bypass vulnerability on several smartphones. The system does not sufficiently verify the permission, an attacker could do a certain operation on certain step of setup wizard. Successful exploit could allow the attacker bypass the FRP protection. Affected products: Mate 20 X, versions earlier than Ever-AL00B 9.0.0.200(C00E200R2P1); Mate 20, versions earlier than Hima-AL00B/Hima-TL00B 9.0.0.200(C00E200R2P1); Honor Magic 2, versions earlier than Tony-AL00B/Tony-TL00B 9.0.0.182(C00E180R2P2). 2019-07-10 not yet calculated CVE-2019-5220
CONFIRM
huawei — mate_20_x There is a path traversal vulnerability on Huawei Share. The software does not properly validate the path, an attacker could crafted a file path when transporting file through Huawei Share, successful exploit could allow the attacker to transport a file to arbitrary path on the phone. Affected products: Mate 20 X versions earlier than Ever-L29B 9.1.0.300(C432E3R1P12), versions earlier than Ever-L29B 9.1.0.300(C636E3R2P1), and versions earlier than Ever-L29B 9.1.0.300(C185E3R3P1). 2019-07-10 not yet calculated CVE-2019-5221
CONFIRM
hunesion — i-onenet In Hunesion i-oneNet version 3.0.7 ~ 3.0.53 and 4.0.4 ~ 4.0.16, the specific upload web module doesn’t verify the file extension and type, and an attacker can upload a webshell. After the webshell upload, an attacker can use the webshell to perform remote code exection such as running a system command. 2019-07-10 not yet calculated CVE-2019-12803
CONFIRM
hunesion — i-onenet In Hunesion i-oneNet version 3.0.7 ~ 3.0.53 and 4.0.4 ~ 4.0.16, due to the lack of update file integrity checking in the upgrade process, an attacker can craft malicious file and use it as an update. 2019-07-10 not yet calculated CVE-2019-12804
CONFIRM
ibm — content_navigator IBM Content Navigator 3.0CD is vulnerable to local file inclusion, allowing an attacker to access a configuration file in the ICN server. IBM X-Force ID: 160015. 2019-07-11 not yet calculated CVE-2019-4263
XF
CONFIRM
ibm — security_identity_manager IBM Security Identity Manager 7.0.1 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 153749. 2019-07-11 not yet calculated CVE-2018-1968
CONFIRM
XF
intel — processor_diagnostic_tool Improper access control in the Intel(R) Processor Diagnostic Tool before version 4.1.2.24 may allow an authenticated user to potentially enable escalation of privilege, information disclosure or denial of service via local access. 2019-07-11 not yet calculated CVE-2019-11133
BID
CONFIRM
intel — ssd_dc_s4500_and_s4600_devices Improper authentication in firmware for Intel(R) SSD DC S4500 Series and Intel(R) SSD DC S4600 Series before SCV10150 may allow an unprivileged user to potentially enable escalation of privilege via physical access. 2019-07-11 not yet calculated CVE-2018-18095
BID
CONFIRM
intuit — lacerte Intuit Lacerte 2017 has Incorrect Access Control. 2019-07-09 not yet calculated CVE-2018-14833
MISC
MISC
invoxia — nvx220_devices Invoxia NVX220 devices allow TELNET access as admin with a default password. 2019-07-05 not yet calculated CVE-2018-14528
MISC
ivanti — endpoint_manager An issue was discovered in the Core Server in Ivanti Endpoint Manager (EPM) 2017.3 before SU7 and 2018.x before 2018.3 SU3, with remote code execution. In other words, the issue affects 2017.3, 2018.1, and 2018.3 installations that lack the April 2019 update. 2019-07-11 not yet calculated CVE-2019-10651
CONFIRM
jenkins — jenkins Jenkins Port Allocator Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. 2019-07-11 not yet calculated CVE-2019-10350
MLIST
MISC
jenkins — jenkins A stored cross site scripting vulnerability in Jenkins Dependency Graph Viewer Plugin 0.13 and earlier allowed attackers able to configure jobs in Jenkins to inject arbitrary HTML and JavaScript in the plugin-provided web pages in Jenkins. 2019-07-11 not yet calculated CVE-2019-10349
MISC
MLIST
MISC
jenkins — jenkins Jenkins Gogs Plugin stored credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. 2019-07-11 not yet calculated CVE-2019-10348
MLIST
MISC
jenkins — jenkins Jenkins Mashup Portlets Plugin stored credentials unencrypted on the Jenkins master where they can be viewed by users with access to the master file system. 2019-07-11 not yet calculated CVE-2019-10347
MLIST
MISC
jenkins — jenkins A reflected cross site scripting vulnerability in Jenkins Embeddable Build Status Plugin 2.0.1 and earlier allowed attackers inject arbitrary HTML and JavaScript into the response of this plugin. 2019-07-11 not yet calculated CVE-2019-10346
MLIST
MISC
jenkins — jenkins A missing permission check in Jenkins Docker Plugin 1.1.6 and earlier in various ‘fillCredentialsIdItems’ methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins. 2019-07-11 not yet calculated CVE-2019-10342
MLIST
MISC
jenkins — jenkins A missing permission check in Jenkins Docker Plugin 1.1.6 and earlier in DockerAPI.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. 2019-07-11 not yet calculated CVE-2019-10341
MLIST
MISC
jenkins — jenkins A cross-site request forgery vulnerability in Jenkins Docker Plugin 1.1.6 and earlier in DockerAPI.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. 2019-07-11 not yet calculated CVE-2019-10340
MLIST
MISC
jenkins — jenkins Jenkins Caliper CI Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. 2019-07-11 not yet calculated CVE-2019-10351
MLIST
MISC
juniper — junos_os A vulnerability in the pfe-chassisd Chassis Manager (CMLC) daemon of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the EX4300 when specific valid broadcast packets create a broadcast storm condition when received on the me0 interface of the EX4300 Series device. A reboot of the device is required to restore service. Continued receipt of these valid broadcast packets will create a sustained Denial of Service (DoS) against the device. Affected releases are Juniper Networks Junos OS: 16.1 versions above and including 16.1R1 prior to 16.1R7-S5; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R3; 17.3 versions prior to 17.3R3-S2; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R3; 18.2 versions prior to 18.2R2. 2019-07-11 not yet calculated CVE-2019-0046
CONFIRM
juniper — junos_os On EX4300 Series switches with TCAM optimization enabled, incoming multicast traffic matches an implicit loopback filter rule first, since it has high priority. This rule is meant for reserved multicast addresses 224.0.0.x, but incorrectly matches on 224.x.x.x. Due to this bug, when a firewall filter is applied on the loopback interface, other firewall filters might stop working for multicast traffic. The command ‘show firewall filter’ can be used to confirm whether the filter is working. This issue only affects the EX4300 switch. No other products or platforms are affected by this vulnerability. This issue affects: Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D51, 14.1X53-D115 on EX4300 Series; 17.1 versions prior to 17.1R3 on EX4300 Series; 17.2 versions prior to 17.2R3-S2 on EX4300 Series; 17.3 versions prior to 17.3R3-S3 on EX4300 Series; 17.4 versions prior to 17.4R2-S5, 17.4R3 on EX4300 Series; 18.1 versions prior to 18.1R3-S1 on EX4300 Series; 18.2 versions prior to 18.2R2 on EX4300 Series; 18.3 versions prior to 18.3R2 on EX4300 Series. 2019-07-11 not yet calculated CVE-2019-0048
CONFIRM
juniper — junos_os On Junos devices with the BGP graceful restart helper mode enabled or the BGP graceful restart mechanism enabled, a certain sequence of BGP session restart on a remote peer that has the graceful restart mechanism enabled may cause the local routing protocol daemon (RPD) process to crash and restart. Repeated crashes of the RPD process can cause prolonged Denial of Service (DoS). Graceful restart helper mode for BGP is enabled by default. No other Juniper Networks products or platforms are affected by this issue. Affected releases are Juniper Networks Junos OS: 16.1 versions prior to 16.1R7-S3; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R3; 17.2X75 versions prior to 17.2X75-D105; 17.3 versions prior to 17.3R3-S2; 17.4 versions prior to 17.4R1-S7, 17.4R2-S2, 17.4R3; 18.1 versions prior to 18.1R3-S2; 18.2 versions prior to 18.2R2; 18.2X75 versions prior to 18.2X75-D12, 18.2X75-D30; 18.3 versions prior to 18.3R1-S4, 18.3R2. Junos OS releases prior to 16.1R1 are not affected. 2019-07-11 not yet calculated CVE-2019-0049
CONFIRM
juniper — junos_os The srxpfe process may crash on SRX Series services gateways when the UTM module processes a specific fragmented HTTP packet. The packet is misinterpreted as a regular TCP packet which causes the processor to crash. This issue affects all SRX Series platforms that support URL-Filtering and have web-filtering enabled. Affected releases are Juniper Networks Junos OS: 12.3X48 versions prior to 12.3X48-D85 on SRX Series; 15.1X49 versions prior to 15.1X49-D181, 15.1X49-D190 on SRX Series; 17.3 versions on SRX Series; 17.4 versions prior to 17.4R1-S8, 17.4R2-S5, 17.4R3 on SRX Series; 18.1 versions prior to 18.1R3-S6 on SRX Series; 18.2 versions prior to 18.2R2-S1, 18.2R3 on SRX Series; 18.3 versions prior to 18.3R1-S2, 18.3R2 on SRX Series; 18.4 versions prior to 18.4R1-S1, 18.4R2 on SRX Series. 2019-07-11 not yet calculated CVE-2019-0052
CONFIRM
juniper — junos_os Insufficient validation of environment variables in the telnet client supplied in Junos OS can lead to stack-based buffer overflows, which can be exploited to bypass veriexec restrictions on Junos OS. A stack-based overflow is present in the handling of environment variables when connecting via the telnet client to remote telnet servers. This issue only affects the telnet client ? accessible from the CLI or shell ? in Junos OS. Inbound telnet services are not affected by this issue. This issue affects: Juniper Networks Junos OS: 12.3 versions prior to 12.3R12-S13; 12.3X48 versions prior to 12.3X48-D80; 14.1X53 versions prior to 14.1X53-D130, 14.1X53-D49; 15.1 versions prior to 15.1F6-S12, 15.1R7-S4; 15.1X49 versions prior to 15.1X49-D170; 15.1X53 versions prior to 15.1X53-D237, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69; 16.1 versions prior to 16.1R3-S11, 16.1R7-S4; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S6, 17.4R2-S3, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R1-S5, 18.2R2-S2, 18.2R3; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2. 2019-07-11 not yet calculated CVE-2019-0053
CONFIRM
MISC
leanote — leanote Leanote prior to version 2.6 is affected by: Cross Site Scripting (XSS). 2019-07-11 not yet calculated CVE-2019-1010003
MISC
libpng — libpng libpng before 1.6.32 does not properly check the length of chunks against the user limit. 2019-07-10 not yet calculated CVE-2017-12652
CONFIRM
linux — linux_kernel In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. 2019-07-05 not yet calculated CVE-2019-10638
BID
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
linux — linux_kernel The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker’s web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace. 2019-07-05 not yet calculated CVE-2019-10639
MISC
MISC
MISC
MISC
london_trust_media — private_internet_access_vpn_client_for_linux A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for Linux could allow an authenticated, local attacker to run arbitrary code with elevated privileges. The openvpn_launcher.64 binary is setuid root. This binary executes /opt/pia/openvpn-64/openvpn, passing the parameters provided from the command line. Care was taken to programmatically disable potentially dangerous openvpn parameters; however, the –route-pre-down parameter can be used. This parameter accepts an arbitrary path to a script/program to be executed when OpenVPN exits. The –script-security parameter also needs to be passed to allow for this action to be taken, and –script-security is not currently in the disabled parameter list. A local unprivileged user can pass a malicious script/binary to the –route-pre-down option, which will be executed as root when openvpn is stopped. 2019-07-11 not yet calculated CVE-2019-12578
MISC
london_trust_media — private_internet_access_vpn_client_for_linux A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for Linux could allow an authenticated, local attacker to run arbitrary code with elevated privileges. The root_runner.64 binary is setuid root. This binary executes /opt/pia/ruby/64/ruby, which in turn attempts to load several libraries under /tmp/ruby-deploy.old/lib. A local unprivileged user can create a malicious library under this path to execute arbitrary code as the root user. 2019-07-11 not yet calculated CVE-2019-12575
MISC
london_trust_media — private_internet_access_vpn_client_for_linux_and_macos A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for Linux and macOS could allow an authenticated, local attacker to run arbitrary code with elevated privileges. The PIA Linux/macOS binary openvpn_launcher.64 binary is setuid root. This binary accepts several parameters to update the system configuration. These parameters are passed to operating system commands using a “here” document. The parameters are not sanitized, which allow for arbitrary commands to be injected using shell metacharacters. A local unprivileged user can pass special crafted parameters that will be interpolated by the operating system calls. 2019-07-11 not yet calculated CVE-2019-12579
MISC
london_trust_media — private_internet_access_vpn_client_for_linux_and_macos A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for Linux and macOS could allow an authenticated, local attacker to overwrite arbitrary files. The openvpn_launcher binary is setuid root. This binary supports the –log option, which accepts a path as an argument. This parameter is not sanitized, which allows a local unprivileged user to overwrite arbitrary files owned by any user on the system, including root. This creates a denial of service condition and possible data loss if leveraged by a malicious local user. 2019-07-11 not yet calculated CVE-2019-12573
MISC
london_trust_media — private_internet_access_vpn_client_for_macos A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for macOS could allow an authenticated, local attacker to run arbitrary code with elevated privileges. The openvpn_launcher binary is setuid root. This program is called during the connection process and executes several operating system utilities to configure the system. The networksetup utility is called using relative paths. A local unprivileged user can execute arbitrary commands as root by creating a networksetup trojan which will be executed during the connection process. This is possible because the PATH environment variable is not reset prior to executing the OS utility. 2019-07-11 not yet calculated CVE-2019-12576
MISC
london_trust_media — private_internet_access_vpn_client_for_macos A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v0.9.8 beta (build 02099) for macOS could allow an authenticated, local attacker to overwrite arbitrary files. When the client initiates a connection, the XML /tmp/pia-watcher.plist file is created. If the file exists, it will be truncated and the contents completely overwritten. This file is removed on disconnect. An unprivileged user can create a hard or soft link to arbitrary files owned by any user on the system, including root. This creates a denial of service condition and possible data loss if leveraged by a malicious local user. 2019-07-11 not yet calculated CVE-2019-12571
MISC
london_trust_media — private_internet_access_vpn_client_for_macos A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for macOS could allow an authenticated, local attacker to run arbitrary code with elevated privileges. The macOS binary openvpn_launcher.64 is setuid root. This binary creates /tmp/pia_upscript.sh when executed. Because the file creation mask (umask) is not reset, the umask value is inherited from the calling process. This value can be manipulated to cause the privileged binary to create files with world writable permissions. A local unprivileged user can modify /tmp/pia_upscript.sh during the connect process to execute arbitrary code as the root user. 2019-07-11 not yet calculated CVE-2019-12577
MISC
london_trust_media — private_internet_access_vpn_client_for_windows A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v1.0 for Windows could allow an authenticated, local attacker to run arbitrary code with elevated privileges. The PIA client is vulnerable to a DLL injection vulnerability during the software update process. The updater loads several libraries from a folder that authenticated users have write access to. A low privileged user can leverage this vulnerability to execute arbitrary code as SYSTEM. 2019-07-11 not yet calculated CVE-2019-12574
MISC
mailenable — mailenable_enterprise_premium MailEnable Enterprise Premium 10.23 was vulnerable to multiple directory traversal issues, with which authenticated users could add, remove, or potentially read files in arbitrary folders accessible by the IIS user. This could lead to reading other users’ credentials including those of SYSADMIN accounts, reading other users’ emails, or adding emails or files to other users’ accounts. 2019-07-08 not yet calculated CVE-2019-12925
CONFIRM
MISC
mailenable — mailenable_enterprise_premium MailEnable Enterprise Premium 10.23 did not use appropriate access control checks in a number of areas. As a result, it was possible to perform a number of actions, when logged in as a user, that that user should not have had permission to perform. It was also possible to gain access to areas within the application for which the accounts used were supposed to have insufficient access. 2019-07-08 not yet calculated CVE-2019-12926
CONFIRM
MISC
mailenable — mailenable_enterprise_premium MailEnable Enterprise Premium 10.23 was vulnerable to stored and reflected cross-site scripting (XSS) attacks. Because the session cookie did not use the HttpOnly flag, it was possible to hijack the session cookie by exploiting this vulnerability. 2019-07-08 not yet calculated CVE-2019-12927
CONFIRM
MISC
mailenable — mailenable_enterprise_premium MailEnable Enterprise Premium 10.23 was vulnerable to XML External Entity Injection (XXE) attacks that could be exploited by an unauthenticated user. It was possible for an attacker to use a vulnerability in the configuration of the XML processor to read any file on the host system. Because all credentials were stored in a cleartext file, it was possible to steal all users’ credentials (including the highest privileged users). 2019-07-08 not yet calculated CVE-2019-12924
CONFIRM
MISC
mailenable — mailenable_enterprise_premium In MailEnable Enterprise Premium 10.23, the potential cross-site request forgery (CSRF) protection mechanism was not implemented correctly and it was possible to bypass it by removing the anti-CSRF token parameter from the request. This could allow an attacker to manipulate a user into unwittingly performing actions within the application (such as sending email, adding contacts, or changing settings) on behalf of the attacker. 2019-07-08 not yet calculated CVE-2019-12923
CONFIRM
MISC
matrixssl — matrixssl MatrixSSL before 4.2.1 has an out-of-bounds read during ASN.1 handling. 2019-07-09 not yet calculated CVE-2019-13470
MISC
minimagick — minmagick In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image filename could cause remote command execution because Image.open input is directly passed to Kernel#open, which accepts a ‘|’ character followed by a command. 2019-07-11 not yet calculated CVE-2019-13574
MISC
MISC
MISC
MISC
DEBIAN
mobatech — mobaxterm In MobaXterm 11.1, the mobaxterm: URI handler has an argument injection vulnerability that allows remote attackers to execute arbitrary commands when the user visits a specially crafted URL. Based on the available command-line arguments of the software, one can simply inject -exec to execute arbitrary commands. The additional arguments -hideterm and -exitwhendone in the payload make the attack less visible. 2019-07-09 not yet calculated CVE-2019-13475
MISC
mybb — mybb An CSRF issue was discovered in the JN-Jones MyBB-2FA plugin through 2014-11-05 for MyBB. An attacker can forge a request to an installed mybb2fa plugin to control its state via usercp.php?action=mybb2fa&do=deactivate (or usercp.php?action=mybb2fa&do=activate). A deactivate operation lowers the security of the targeted account by disabling two factor authentication. 2019-07-11 not yet calculated CVE-2019-12363
MISC
MISC
netfilter — iptables A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c. 2019-07-12 not yet calculated CVE-2019-11360
MISC
CONFIRM
netiq — advanced_authentication_framework A potential Man in the Middle attack (MITM) was found in NetIQ Advanced Authentication Framework versions prior to 6.0. 2019-07-10 not yet calculated CVE-2019-11650
CONFIRM
npmjs — serve-here.js Path traversal vulnerability in version up to v1.1.3 in serve-here.js npm module allows attackers to list any file in arbitrary folder. 2019-07-10 not yet calculated CVE-2019-5444
MISC
nuxt — nuxt.js @nuxt/devalue before 1.2.3, as used in Nuxt.js before 2.6.2, mishandles object keys, leading to XSS. 2019-07-11 not yet calculated CVE-2019-13506
MISC
MISC
MISC
MISC
MISC
MISC
ovirt — ovirt_metrics Sensitive passwords used in deployment and configuration of oVirt Metrics, all versions. were found to be insufficiently protected. Passwords could be disclosed in log files (if playbooks are run with -v) or in playbooks stored on Metrics or Bastion hosts. 2019-07-11 not yet calculated CVE-2019-10194
CONFIRM
patchwork — patchwork A Cross Site Scripting (XSS) vulnerability exists in the template tag used to render message ids in Patchwork v1.1 through v2.1.x. This allows an attacker to insert JavaScript or HTML into the patch detail page via an email sent to a mailing list consumed by Patchwork. This affects the function msgid in templatetags/patch.py. Patchwork versions v2.1.4 and v2.0.4 will contain the fix. 2019-07-10 not yet calculated CVE-2019-13122
MISC
MLIST
MISC
MISC
MISC
MISC
MISC
php — php main/streams/xp_socket.c in PHP 7.x before 2017-03-07 misparses fsockopen calls, such as by interpreting fsockopen(‘127.0.0.1:80’, 443) as if the address/port were 127.0.0.1:80:443, which is later truncated to 127.0.0.1:80. This behavior has a security risk if the explicitly provided port number (i.e., 443 in this example) is hardcoded into an application as a security policy, but the hostname argument (i.e., 127.0.0.1:80 in this example) is obtained from untrusted input. 2019-07-10 not yet calculated CVE-2017-7189
MISC
MISC
prestashop — prestashop In PrestaShop before 1.7.6.0 RC2, the id_address_delivery and id_address_invoice parameters are affected by an Insecure Direct Object Reference vulnerability due to a guessable value sent to the web application during checkout. An attacker could leak personal customer information. This is PrestaShop bug #14444. 2019-07-09 not yet calculated CVE-2019-13461
MISC
MISC
project_redcap — redcap Multiple stored Cross-site scripting (XSS) issues in the admin panel and survey system in REDCap 8 before 8.10.20 and 9 before 9.1.2 allow an attacker to inject arbitrary malicious HTML or JavaScript code into a user’s web browser. 2019-07-11 not yet calculated CVE-2019-13029
MISC
python — python http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3. 2019-07-13 not yet calculated CVE-2018-20852
MISC
MISC
quest — kace Quest KACE, all versions prior to version 8.0.x, 8.1.x, and 9.0.x, allows unintentional access to the appliance leveraging functions of the troubleshooting tools located in the administrator user interface. 2019-07-08 not yet calculated CVE-2019-10973
BID
MISC
rapid7 — insight_agent Rapid7 Insight Agent, version 2.6.3 and prior, suffers from a local privilege escalation due to an uncontrolled DLL search path. Specifically, when Insight Agent 2.6.3 and prior starts, the Python interpreter attempts to load python3.dll at “C:\DLLs\python3.dll,” which normally is writable by locally authenticated users. Because of this, a malicious local user could use Insight Agent’s startup conditions to elevate to SYSTEM privileges. This issue was fixed in Rapid7 Insight Agent 2.6.4. 2019-07-12 not yet calculated CVE-2019-5629
MISC
FULLDISC
MISC
CONFIRM
BUGTRAQ
razor — surround The RzSurroundVADStreamingService (RzSurroundVADStreamingService.exe) in Razer Surround 1.1.63.0 runs as the SYSTEM user using an executable located in %PROGRAMDATA%\Razer\Synapse\Devices\Razer Surround\Driver\. The DACL on this folder allows any user to overwrite contents of files in this folder, resulting in Elevation of Privilege. 2019-07-09 not yet calculated CVE-2019-13142
MISC
realization — concerto_critical_chain_planner Realization Concerto Critical Chain Planner (aka CCPM) 5.10.8071 has SQL Injection in at least in the taskupdt/taskdetails.aspx webpage via the projectname parameter. 2019-07-12 not yet calculated CVE-2019-13027
MISC
red_hat — openshift_container_platform A reflected XSS vulnerability exists in authorization flow of OpenShift Container Platform versions: openshift-online-3, openshift-enterprise-3.4 through 3.7 and openshift-enterprise-3.9 through 3.11. An attacker could use this flaw to steal authorization data by getting them to click on a malicious link. 2019-07-11 not yet calculated CVE-2019-3889
CONFIRM
rockwell_automation — panelview_5510 In Rockwell Automation PanelView 5510 (all versions manufactured before March 13, 2019 that have never been updated to v4.003, v5.002, or later), a remote, unauthenticated threat actor with access to an affected PanelView 5510 Graphic Display, upon successful exploit, may boot-up the terminal and gain root-level access to the device?s file system. 2019-07-11 not yet calculated CVE-2019-10970
BID
MISC
sap — abap_server_and_abap_platform ABAP Server and ABAP Platform (SAP Basis), versions, 7.31, 7.4, 7.5, do not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. 2019-07-10 not yet calculated CVE-2019-0321
BID
MISC
CONFIRM
sap — businessobjects_business_intelligence_platform SAP BusinessObjects Business Intelligence Platform (BI Workspace) (Enterprise), versions 4.1, 4.2, 4.3, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. 2019-07-10 not yet calculated CVE-2019-0326
BID
MISC
CONFIRM
sap — commerce_cloud SAP Commerce Cloud (previously known as SAP Hybris Commerce), (HY_COM, versions 6.3, 6.4, 6.5, 6.6, 6.7, 1808, 1811), allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. 2019-07-10 not yet calculated CVE-2019-0322
BID
MISC
CONFIRM
sap — diagnostic_agent The OS Command Plugin in the transaction GPA_ADMIN and the OSCommand Console of SAP Diagnostic Agent (LM-Service), version 7.2, allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application. 2019-07-10 not yet calculated CVE-2019-0330
BID
MISC
CONFIRM
sap — erp_hcm SAP ERP HCM (SAP_HRCES) , version 3, does not perform necessary authorization checks for a report that reads payroll data of employees in a certain area. Due to this under certain conditions, the user that once had authorization to payroll data of an employee, which was later revoked, may retain access to the same data. 2019-07-10 not yet calculated CVE-2019-0325
BID
MISC
CONFIRM
sap — netweaver_application_server Under certain conditions SAP NetWeaver Application Server for Java (Startup Framework), versions 7.21, 7.22, 7.45, 7.49, and 7.53, allows an attacker to access information which would otherwise be restricted. 2019-07-10 not yet calculated CVE-2019-0318
BID
MISC
CONFIRM
sap — netweaver_for_java_application_server SAP NetWeaver for Java Application Server – Web Container, (engineapi, versions 7.1, 7.2, 7.3, 7.31, 7.4 and 7.5), (servercode, versions 7.2, 7.3, 7.31, 7.4, 7.5), allows an attacker to upload files (including script files) without proper file format validation. 2019-07-10 not yet calculated CVE-2019-0327
BID
MISC
CONFIRM
sap — netweaver_process_integration ABAP Tests Modules (SAP Basis, versions 7.0, 7.1, 7.3, 7.31, 7.4, 7.5) of SAP NetWeaver Process Integration enables an attacker the execution of OS commands with privileged rights. An attacker could thereby impact the integrity and availability of the system. 2019-07-10 not yet calculated CVE-2019-0328
BID
MISC
CONFIRM
sap — sap_gateway The SAP Gateway, versions 7.5, 7.51, 7.52 and 7.53, allows an attacker to inject content which is displayed in the form of an error message. An attacker could thus mislead a user to believe this information is from the legitimate service when it’s not. 2019-07-10 not yet calculated CVE-2019-0319
BID
MISC
MISC
CONFIRM
sap — sapui5_and_openui5 SAPUI5 and OpenUI5, before versions 1.38.39, 1.44.39, 1.52.25, 1.60.6 and 1.63.0, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. 2019-07-10 not yet calculated CVE-2019-0281
BID
MISC
CONFIRM
schedmd — slurm SchedMD Slurm 17.11.x, 18.08.0 through 18.08.7, and 19.05.0 allows SQL Injection. 2019-07-11 not yet calculated CVE-2019-12838
MISC
CONFIRM
MISC
CONFIRM
siemens — simatic_pcs_7_and_simatic_wincc_products A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC Professional (TIA Portal V13) (All versions), SIMATIC WinCC Professional (TIA Portal V14) (All versions), SIMATIC WinCC Professional (TIA Portal V15) (All versions), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions), SIMATIC WinCC Runtime Professional V15 (All versions), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). The SIMATIC WinCC DataMonitor web application of the affected products allows to upload arbitrary ASPX code. The security vulnerability could be exploited by an authenticated attacker with network access to the WinCC DataMonitor application. No user interaction is required to exploit this vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the affected device. At the stage of publishing this security advisory no public exploitation is known. 2019-07-11 not yet calculated CVE-2019-10935
BID
MISC
siemens — siprotec_5_devices A vulnerability has been identified in SIPROTEC 5 device types 6MD85, 6MD86, 6MD89, 7UM85, 7SA87, 7SD87, 7SL87, 7VK87, 7SA82, 7SA86, 7SD82, 7SD86, 7SL82, 7SL86, 7SJ86, 7SK82, 7SK85, 7SJ82, 7SJ85, 7UT82, 7UT85, 7UT86, 7UT87 and 7VE85 with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions < V7.90), All other SIPROTEC 5 device types with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions), SIPROTEC 5 relays with CPU variants CP200 and the respective Ethernet communication modules (All versions), DIGSI 5 engineering software (All versions < V7.90). Specially crafted packets sent to port 443/TCP could cause a Denial of Service condition. 2019-07-11 not yet calculated CVE-2019-10931
MISC
siemens — siprotec_5_devices A vulnerability has been identified in SIPROTEC 5 device types 6MD85, 6MD86, 6MD89, 7UM85, 7SA87, 7SD87, 7SL87, 7VK87, 7SA82, 7SA86, 7SD82, 7SD86, 7SL82, 7SL86, 7SJ86, 7SK82, 7SK85, 7SJ82, 7SJ85, 7UT82, 7UT85, 7UT86, 7UT87 and 7VE85 with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions < V7.90), All other SIPROTEC 5 device types with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions), SIPROTEC 5 relays with CPU variants CP200 and the respective Ethernet communication modules (All versions), DIGSI 5 engineering software (All versions < V7.90). A remote attacker could use specially crafted packets sent to port 443/TCP to upload, download or delete files in certain parts of the file system. 2019-07-11 not yet calculated CVE-2019-10930
MISC
siemens — spectrum_power_products A vulnerability has been identified in Spectrum Power 3 (Corporate User Interface) (All versions <= v3.11), Spectrum Power 4 (Corporate User Interface) (Version v4.75), Spectrum Power 5 (Corporate User Interface) (All versions <= v5.50), Spectrum Power 7 (Corporate User Interface) (All versions <= v2.20). The web server could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. The user does not need to be logged into the web interface in order for the exploitation to succeed. At the stage of publishing this security advisory no public exploitation is known. 2019-07-11 not yet calculated CVE-2019-10933
MISC
siemens — tia_administrator A vulnerability has been identified in TIA Administrator (All versions < V1.0 SP1 Upd1). The integrated configuration web application (TIA Administrator) allows to execute certain application commands without proper authentication. The vulnerability could be exploited by an attacker with local access to the affected system. Successful exploitation requires no privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known. 2019-07-11 not yet calculated CVE-2019-10915
BID
MISC
snapview — mikogo The Windows versions of Snapview Mikogo, versions before 5.10.2 are affected by insecure implementations which allow local attackers to escalate privileges. 2019-07-12 not yet calculated CVE-2019-12731
MISC
sonatype — nexus_repository_manager Sonatype Nexus Repository Manager before 3.17.0 has a weak default of giving any unauthenticated user read permissions on the repository files and images. 2019-07-08 not yet calculated CVE-2019-9630
MISC
sonatype — nexus_repository_manager Sonatype Nexus Repository Manager before 3.17.0 establishes a default administrator user with weak defaults (fixed credentials). 2019-07-08 not yet calculated CVE-2019-9629
MISC
sony — bravia_smart_tv_devices Sony BRAVIA Smart TV devices allow remote attackers to cause a denial of service (device hang) via a crafted web page over HbbTV. 2019-07-09 not yet calculated CVE-2019-11889
MISC
FULLDISC
MISC
MISC
sony — bravia_smart_tv_devices Sony Bravia Smart TV devices allow remote attackers to cause a denial of service (device hang or reboot) via a SYN flood attack over a wired or Wi-Fi LAN. 2019-07-09 not yet calculated CVE-2019-11890
MISC
FULLDISC
MISC
MISC
spiderlabs — owasp_modsecurity_core_rule_set An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) 3.0.2. Use of X.Filename instead of X_Filename can bypass some PHP Script Uploads rules, because PHP automatically transforms dots into underscores in certain contexts where dots are invalid. 2019-07-09 not yet calculated CVE-2019-13464
MISC
MISC
squid-cache — squid An issue was discovered in Squid 4.0.23 through 4.7. When checking Basic Authentication with HttpHeader::getAuth, Squid uses a global buffer to store the decoded data. Squid does not check that the decoded length isn’t greater than the buffer, leading to a heap-based buffer overflow with user controlled data. 2019-07-11 not yet calculated CVE-2019-12527
CONFIRM
CONFIRM
CONFIRM
squid-cache — squid An issue was discovered in Squid 3.3.9 through 3.5.28 and 4.x through 4.7. When Squid is configured to use Digest authentication, it parses the header Proxy-Authorization. It searches for certain tokens such as domain, uri, and qop. Squid checks if this token’s value starts with a quote and ends with one. If so, it performs a memcpy of its length minus 2. Squid never checks whether the value is just a single quote (which would satisfy its requirements), leading to a memcpy of its length minus 1. 2019-07-11 not yet calculated CVE-2019-12525
CONFIRM
CONFIRM
CONFIRM
squid-cache — squid An issue was discovered in Squid 2.x through 2.7.STABLE9, 3.x through 3.5.28, and 4.x through 4.7. When Squid is configured to use Basic Authentication, the Proxy-Authorization header is parsed via uudecode. uudecode determines how many bytes will be decoded by iterating over the input and checking its table. The length is then used to start decoding the string. There are no checks to ensure that the length it calculates isn’t greater than the input buffer. This leads to adjacent memory being decoded as well. An attacker would not be able to retrieve the decoded data unless the Squid maintainer had configured the display of usernames on error pages. 2019-07-11 not yet calculated CVE-2019-12529
CONFIRM
CONFIRM
CONFIRM
stopzilla — stopzilla_antimalware An issue was discovered in STOPzilla AntiMalware 6.5.2.59. The driver file szkg64.sys contains an Arbitrary Write vulnerability due to not validating the output buffer address value from IOCtl 0x8000205F. 2019-07-09 not yet calculated CVE-2018-15738
MISC
MISC
sunnet — wmpro The SUNNET WMPro v5.0 and v5.1 for eLearning system has OS Command Injection via “/teach/course/doajaxfileupload.php”. The target server can be exploited without authentication. 2019-07-11 not yet calculated CVE-2019-11062
CONFIRM
CONFIRM
CONFIRM
swift — alliance_web_platform An issue was discovered in SWIFT Alliance Web Platform 7.1.23. A log injection (and an arbitrary log filename) can be achieved via the PATH_INFO to swp/login/EJBRemoteService/, related to com.swift.ejbgwt.j2ee.client.EjBlnvocationException error log information containing null@java:comp/env/ error messages. 2019-07-05 not yet calculated CVE-2018-16386
MISC
symantec — messaging_gateway Symantec Messaging Gateway, prior to 10.7.1, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. 2019-07-11 not yet calculated CVE-2019-12751
BID
MISC
thoughtspot — thoughtspot An authorization bypass vulnerability in pinboard updates in ThoughtSpot 4.4.1 through 5.1.1 (before 5.1.2) allows a low-privilege user with write access to at least one pinboard to corrupt pinboards of another user in the application by spoofing GUIDs in pinboard update requests, effectively deleting them. 2019-07-09 not yet calculated CVE-2019-12782
MISC
CONFIRM
CONFIRM
trendnet — tew-827dru TRENDnet TEW-827DRU with firmware up to and including 2.04B03 contains multiple stack-based buffer overflows when processing user input for the setup wizard, allowing an unauthenticated user to execute arbitrary code. The vulnerability can be exercised on the local intranet or remotely if remote administration is enabled. 2019-07-10 not yet calculated CVE-2019-13279
MISC
trendnet — tew-827dru TRENDnet TEW-827DRU with firmware up to and including 2.04B03 allows an unauthenticated attacker to execute setup wizard functionality, giving this attacker the ability to change configuration values, potentially leading to a denial of service. The request can be made on the local intranet or remotely if remote administration is enabled. 2019-07-09 not yet calculated CVE-2019-13277
MISC
trendnet — tew-827dru TRENDnet TEW-827DRU with firmware up to and including 2.04B03 contains multiple command injections when processing user input for the setup wizard, allowing an unauthenticated user to run arbitrary commands on the device. The vulnerability can be exercised on the local intranet or remotely if remote administration is enabled. 2019-07-10 not yet calculated CVE-2019-13278
MISC
trendnet — tew-827dru TRENDnet TEW-827DRU with firmware up to and including 2.04B03 contains a stack-based buffer overflow in the ssi binary. The overflow allows an unauthenticated user to execute arbitrary code by providing a sufficiently long query string when POSTing to any valid cgi, txt, asp, or js file. The vulnerability can be exercised on the local intranet or remotely if remote administration is enabled. 2019-07-10 not yet calculated CVE-2019-13276
MISC
trendnet — tew-827dru TRENDnet TEW-827DRU with firmware up to and including 2.04B03 contains a stack-based buffer overflow while returning an error message to the user about failure to resolve a hostname during a ping or traceroute attempt. This allows an authenticated user to execute arbitrary code. The exploit can be exercised on the local intranet or remotely if remote administration is enabled. 2019-07-09 not yet calculated CVE-2019-13280
MISC
u.s._army — america’s_army_proving_grounds An issue was discovered in the America’s Army Proving Grounds platform for the Unreal Engine. With a false packet sent via UDP, the application server responds with several bytes, giving the possibility of DoS amplification, even being able to be used in DDoS attacks. 2019-07-10 not yet calculated CVE-2018-10531
MISC
MISC
umbiquiti_networks — edgemax_edgeswitch Command Injection in EdgeMAX EdgeSwitch prior to 1.8.2 allow an Admin user to execute commands as root. 2019-07-10 not yet calculated CVE-2019-5446
MISC
umbiquiti_networks — edgemax_edgeswitch DoS in EdgeMAX EdgeSwitch prior to 1.8.2 allow an Admin user to Crash the SSH CLI interface by using crafted commands. 2019-07-10 not yet calculated CVE-2019-5445
MISC
vmware — esxi VMware ESXi 6.5 suffers from partial denial of service vulnerability in hostd process. Patch ESXi650-201907201-UG for this issue is available. 2019-07-11 not yet calculated CVE-2019-5528
BID
CONFIRM
wavpack — wavpack WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseWave64HeaderConfig (wave64.c:211). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://ift.tt/2LV3umS. 2019-07-11 not yet calculated CVE-2019-1010319
MISC
MISC
wavpack — wavpack WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseCaffHeaderConfig (caff.c:486). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://ift.tt/2LPEo94. 2019-07-11 not yet calculated CVE-2019-1010317
MISC
MISC
wavpack — wavpack WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://ift.tt/2XHdqYv. 2019-07-11 not yet calculated CVE-2019-1010315
MISC
MISC
weseek — growi In WESEEK GROWI before 3.5.0, the site-wide basic authentication can be bypassed by adding a URL parameter access_token (this is the parameter used by the API). No valid token is required since it is not validated by the backend. The website can then be browsed as if no basic authentication is required. 2019-07-09 not yet calculated CVE-2019-13337
MISC
weseek — growi In WESEEK GROWI before 3.5.0, a remote attacker can obtain the password hash of the creator of a page by leveraging wiki access to make API calls for page metadata. In other words, the password hash can be retrieved even though it is not a publicly available field. 2019-07-09 not yet calculated CVE-2019-13338
MISC
wolfvision — cynap WolfVision Cynap before 1.30j uses a static, hard-coded cryptographic secret for generating support PINs for the ‘forgot password’ feature. By knowing this static secret and the corresponding algorithm for calculating support PINs, an attacker can reset the ADMIN password and thus gain remote access. 2019-07-05 not yet calculated CVE-2019-13352
MISC
FULLDISC
MISC
wordpress — wordpress The Rencontre plugin before 3.1.3 for WordPress allows SQL Injection via inc/rencontre_widget.php. 2019-07-08 not yet calculated CVE-2019-13413
MISC
MISC
wordpress — wordpress The Rencontre plugin before 3.1.3 for WordPress allows XSS via inc/rencontre_widget.php. 2019-07-08 not yet calculated CVE-2019-13414
MISC
MISC
zeromq — libzmq In ZeroMQ libzmq before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2, a remote, unauthenticated client connecting to a libzmq application, running with a socket listening with CURVE encryption/authentication enabled, may cause a stack overflow and overwrite the stack with arbitrary data, due to a buffer overflow in the library. Users running public servers with the above configuration are highly encouraged to upgrade as soon as possible, as there are no known mitigations. 2019-07-10 not yet calculated CVE-2019-13132
MLIST
CONFIRM
CONFIRM
MLIST
BUGTRAQ
UBUNTU
DEBIAN
zoho_manageengine — assetexplorer An issue was discovered in Zoho ManageEngine AssetExplorer. There is XSS via the SearchN.do search field. 2019-07-11 not yet calculated CVE-2019-12537
MISC
MISC
zoho_manageengine — servicedesk_plus An issue was discovered in Zoho ManageEngine ServiceDesk Plus 10.5. There is XSS via the WorkOrder.do search field. 2019-07-11 not yet calculated CVE-2019-12540
MISC
MISC
zoom_video_communications — zoom_client In the Zoom Client before 4.4.2 on macOS, remote attackers can cause a denial of service (continual focus grabs) via a sequence of invalid launch?action=join&confno= requests to localhost port 19421. 2019-07-09 not yet calculated CVE-2019-13449
MISC
MISC
MISC
MISC
MISC
zoom_video_communications — zoom_client The Zoom Client before 4.4.53932.0709 on macOS allows remote code execution, a different vulnerability than CVE-2019-13450. If the ZoomOpener daemon (aka the hidden web server) is running, but the Zoom Client is not installed or can’t be opened, an attacker can remotely execute code with a maliciously crafted launch URL. NOTE: ZoomOpener is removed by the Apple Malware Removal Tool (MRT) if this tool is enabled and has the 2019-07-10 MRTConfigData. 2019-07-12 not yet calculated CVE-2019-13567
MISC
MISC
MISC
MISC
MISC
zoom_video_communications — zoom_client_and_ringcentral In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file. 2019-07-09 not yet calculated CVE-2019-13450
BID
MISC
MISC
MISC
MISC
MISC
MISC
MISC
zte — mw_nr8000 ZTE MW NR8000V2.4.4.03 and NR8000V2.4.4.04 are impacted by path traversal vulnerability. Due to path traversal,users can download any files. 2019-07-11 not yet calculated CVE-2019-3415
MISC

Back to top

This product is provided subject to this Notification and this Privacy & Use policy.

National Cybersecurity Drill

The Computer Emergency Response Team of Mauritius (CERT-MU) organised a National Cybersecurity Drill for the Financial Sector and the Department of Civil Aviation from 25th – 28th June 2019 at Palms Hotel, Quatre-Bornes. The main objective of the 4 days’ event was to assess the preparedness of these sectors to resist cyber threats and enable timely detection, response, and mitigation and recovery actions in the event of cyber-attacks. A workshop was held on the 25th June 2019 to familiarize the participants with the way cybersecurity drills are conducted and what is expected from them. The participants were also informed on the team composition for the drill exercise. From 26th – 28th June 2019, various scenarios were simulated during the drill exercise where participants had to come up with their response plans and present same in front of the other teams. The scenarios were conducted by staffs of CERT-MU during these 3 days. We also had a team of 3 Estonian experts from the Cyber4D programme who acted as observers for the cybersecurity drill. The workshop was attended by some 70 people on the 25th June 2019 and some 40 participants took part in the cybersecurity drill exercise which consisted of the Department of Civil Aviation, Financial Intelligence Unit, Financial Services Commission, Bank of Mauritius, and 9 commercial banks of the country.

National Cybersecurity Drill for the Financial Sector

The Computer Emergency Response Team of Mauritius (CERT-MU) organised a National Cybersecurity Drill for the Financial Sector and the Department of Civil Aviation from 25th – 28th June 2019 at Palms Hotel, Quatre-Bornes. The main objective of the 4 days’ event was to assess the preparedness of these sectors to resist cyber threats and enable timely detection, response, and mitigation and recovery actions in the event of cyber-attacks. A workshop was held on the 25th June 2019 to familiarize the participants with the way cybersecurity drills are conducted and what is expected from them. The participants were also informed on the team composition for the drill exercise. From 26th – 28th June 2019, various scenarios were simulated during the drill exercise where participants had to come up with their response plans and present same in front of the other teams. The scenarios were conducted by staffs of CERT-MU during these 3 days. We also had a team of 3 Estonian experts from the Cyber4D programme who acted as observers for the cybersecurity drill. The workshop was attended by some 70 people on the 25th June 2019 and some 40 participants took part in the cybersecurity drill exercise which consisted of the Department of Civil Aviation, Financial Intelligence Unit, Financial Services Commission, Bank of Mauritius, and 9 commercial banks of the country. 
 

Prime Minister launches Victoria Urban Terminal project

GIS – 28 June, 2019: The Victoria Urban Terminal project, a first-of-its-kind multimodal complex to the tune of some Rs 1.9 billion, was officially launched, yesterday, by the Prime Minister, Minister of Home Affairs, External Communications and National Development Unit, Minister of Finance and Economic Development, Mr Pravind Jugnauth, at the Caudan Arts Centre in Port Louis. The Minister of Public Infrastructure and Land Transport, Minister of Foreign Affairs, Regional Integration and International Trade, Mr Nandcoomar Bodha, other Ministers, Members of Parliament, and other personalities were also present at the launching ceremony.

The Terminal project, expected to be completed in some two years, revolves around a redefined architecture including the restoration of the ex-NTA building, provision of space for leisure activities, food courts, shops and lucrative commercial activities as well as historical monuments. The contract for the Victoria Urban Terminal project has been awarded to the consortium Transinvest-General Construction-IBL-Innodis-Promotion and Development-RHT Bus Services.
In his address, the Prime Minister reiterated Government’s commitment to modernise the country, for the benefit of all citizens, through public-private partnerships such as the Victoria Urban Terminal, a project which will undoubtedly be profitable and generate wealth. He announced that similar projects, totalling investments of more than Rs 10 billion will also be developed along the route of the Metro Express.
 
Prime Minister Jugnauth stated that eligible hawkers willing to buy their own stalls in the new urban terminals at Victoria and Immigration Square stations will be given concessional financing assistance through the Development Bank of Mauritius. He further made an appeal for public understanding during the proceedings.
 
For his part, Minister Bodha stated that the renovation works for the old Victoria bus terminal are expected to cost some Rs 350 million. He added that some 600 buses, 50 taxis and 1 000 hawkers will have to be relocated during the construction of the Victoria Urban Terminal.
 
Some 100 000 passengers are expected to pass through the Victoria Urban Terminal daily. This project spreading over an area of ​​5.25 acres, will house a terminal comprising 22 stands, offices on area of 2 992 m2, a parking area of ​​400 spaces over 2 200 m2, the Victoria Market on 7 200 m2, the Victoria Shopping Centre on 8 480 m2, a supermarket on 2 448 m2, and a food court of 1 049 m2. Some 1 000 hawkers will also be accommodated in the complex.
 
 

Government Information Service, Prime Minister’s Office, Level 6, New Government Centre, Port Louis, Mauritius. Email: gis@govmu.org  Website: http://gis.govmu.org  Mobile App: Search Gov

Maurice annonce la tenue d’un sommet mondial sur la sécurité maritime et renforce son leadership régional dans ce domaine

Deuxième conférence ministérielle sur la sécurité maritime et 22ième plénière du GCPCS
Maurice annonce la tenue d’un sommet mondial sur la sécurité maritime et renforce son leadership régional dans ce domaine
 
Maurice assoit son rôle de leadership dans la sécurité maritime régionale et annonce la tenue d’un sommet mondial sur la sureté des mers contre les crime. Avec le concours de la Commission de l’océan Indien (COI), elle continue à mobiliser l’effort de la communauté internationale pour sécuriser les routes maritimes et dans l’océan Indien occidental.
Durant toute une semaine, la sécurité maritime a été au cœur de l’agenda régional. Plus de 200 délégués de haut niveau venant d’une quarantaine de pays et organisations internationales se ont donnés rendez-vous à Maurice pour la Conférence ministérielle sur la sécurité maritime dans l’océan Indien occidental des 18 et 19 juin 2019 et pour la 22e session plénière du Groupe de contact sur la piraterie au large des côtes somaliennes le 20 juin.
La sécurité maritime, a indiqué le ministre des Affaires étrangères de Maurice, M. Nandcoomar Bodha, est devenu un enjeu de développement majeur pour les pays de la région qui sont en train de développer l’économie bleue pour générer de nouvelles sources de richesse nationale pour leurs populations.
Le chef de la diplomatie mauricienne a rappelé que la deuxième édition de la conférence ministérielle a pour objectif de prolonger et de raffermir les grandes avancées réalisées lors de la dernière édition notamment en terme de la mise en œuvre d’une feuille de route pour renforcer l’architecture de surveillance des mers.
L’entrée en opération du Centre de Coordination aux Seychelles et du Centre de Fusion à Madagascar, mise en place dans le cadre des Accords MASE (Maritime Security Programme), répond à une exigence de sécurité des océans dans la région.
Le ministre a fait un appel aux pays de la région qui n’ont pas encore signé ces accords de le faire en vue de renforcer la coopération régionale face aux risques sécuritaires en
Le ministre Mentor et ministre de la Défense, Sir Anerood Jugnauth, a, lui, annoncé la tenue d’un sommet mondial sur la sécurité de océans, réaffirmant ainsi le rôle de leadership que compte jouer Maurice dans ce domaine vital de l’économie et de la sécurité mondiale. Maurice qui revendique dorénavant avec détermination son statut d’Etat océan avec une immense zone économique exclusive de plus de 2,3 millions de kilomètres carrés veut faire entendre sa voix dans la région et sur la scène internationale.
Le bassin occidental de l’océan indien revêt une importance au niveau mondial. En effet, ce vaste espace bordé par une quinzaine d’Etats est traversé par des grandes routes maritimes reliant l’Asie, le Moyen Orient, l’Afrique orientale et australe et l’Europe.
Au-delà de la piraterie qui a longtemps été un risque sécuritaire majeur dans la région, d’autres menaces ont émergé et se développent dans l’océan indien occidental dont la criminalité transnationale et organisée, notamment le trafic d’êtres humains, l’immigration clandestine organisée, le trafic d’armes et le terrorisme. Le trafic de drogue est particulièrement important dans la zone, mettant en danger Maurice et ses voisins.
 
La conférence ministérielle et la plénière du GCPCS ont permis de faire le point sur les enjeux de sécurité maritime et les initiatives en cours pour y répondre. Au total, une trentaine d’initiatives luttant contre les différents aspects de l’insécurité maritime (piraterie, trafic de drogue, traite d’êtres humains, attaques à mains armées, pêche illégale, blanchiment d’argent, risque terroriste, pollution…) ont cours dans l’océan Indien occidental. Les participants à la Conférence ministérielle ont ainsi appelé à une coordination effective de l’ensemble de ces initiatives pour éviter les chevauchements et assurer une sécurisation de long terme de l’océan Indien occidental traversé par des routes maritimes d’importance mondiale.
Parmi ces initiatives, les mécanismes d’échange d’information et de coordination des actions en mer, mis en place à travers le programme MASE financé par l’Union européenne, et les activités du Code de conduite de Djibouti et ses amendements de Djeddah ont particulièrement retenu l’attention puisqu’ils fondent une architecture régionale de sécurité maritime adaptée aux besoins de la région. Les Centres régionaux mis en place à travers ces initiatives permettent en effet de mieux coordonner les actions en mer et de fluidifier la circulation de l’information entre les administrations nationales chargées de la sécurité. Les outils déployés dans le cadre du programme MASE auprès du Centre régional de fusion de l’information maritime à Madagascar et du Centre régional de coordination opérationnelle aux Seychelles permettront notamment de suivre la situation maritime en temps réel et d’identifier rapidement les comportements suspects ou les cas de détresse en mer pour une intervention coordonnée. Les participants ont également indiqué leur appréciation positive de la participation des partenaires internationaux aux opérations sur le terrain, notamment des forces navales (EUNAVFOR Atalanta, Combined Maritime Forces, les pourvoyeurs extérieurs de sécurité et l’OTAN)
A l’issue des travaux, les délégués ont adopté la Déclaration de la Conférence ministérielle sur la sécurité maritime dans l’océan Indien occidental et le Communiqué final de la 22e session plénière du CGPCS, deux documents qui fixent le cap des actions à venir pour la sécurité maritime régionale. Les organisations régionales de l’Afrique orientale (COMESA, IGAD, EAC et COI) sont appelées à rester en première ligne de la mobilisation et de l’action pour la sécurité maritime en appui à leurs Etats membres et avec le soutien des partenaires au développement, notamment l’Union européenne.
Déterminées à approfondir l’engagement pour la sécurité maritime, « condition essentielle pour développer l’économie bleue et assurer la stabilité, le progrès social et la sécurité humaine », les autorités mauriciennes, par la voix du ministre mauricien des Affaires étrangères, de l’Intégration régionale et du Commerce international, Nandcoomar Bodha, également président en exercice du CGPCS au nom de la COI, ont annoncé l’organisation d’une nouvelle édition de la Conférence ministérielle en 2020 visant à évaluer la mise en œuvre de la Déclaration adoptée le 19 juin. Nandcoomar Bodha a également symboliquement remis le fanion du CGPCS à Raychelle Omamo, ministre de la Défense du Kenya  qui prendra la présidence de ce Groupe de contact à compter de janvier 2020 pour deux ans. Ce passage de témoin exprime la volonté des Etats de la région de jouer un rôle croissant et prépondérant pour la sécurité maritime régionale avec le concours renouvelé de la communauté internationale.
Cette semaine de la sécurité maritime, organisée par la République de Maurice en partenariat avec la COI et le soutien de l’Union européenne, a été marquée par la présence des ministres des Comores, de Djibouti, du Kenya, de Madagascar, du Secrétaire d’Etat des Seychelles représentant la présidence du Conseil des ministres de la COI, de la sous-secrétaire générale pour l’Afrique du Département des Affaires politiques et de Consolidation de la paix des Nations unies, des ambassadeurs de l’Union européenne, de France, du Royaume-Uni, de Chine, d’Inde et du Japon, entre autres, et de hauts-représentants des Etats-Unis, de plusieurs pays africains, arabes, asiatiques et européens, des forces navales, du COMESA, de l’IGAD, de la COI ou encore des agences onusiennes (Organisation maritime internationale, Organisation internationale pour les migrations, Office des Nations unies contre la drogue et le crime, FAO…).
Click on links to view/Cliquez sur les liens pour lire:
 

Cabinet Decisions taken on 21 JUNE 2019

CABINET DECISIONS    21 JUNE 2019
 
 
1.         Cabinet has agreed to an early introduction into the National Assembly of the Declaration of Assets (Amendment) Bill.  The object of the Bill is to amend the Declaration of Assets Act 2018 –
 
(a)       by widening the definition of “assets”, so that assets to be declared under the Act shall include any money deposited in a non-bank deposit taking institution by the Bank of Mauritius;
 
(b)       so as to give a definition to the term “State-owned enterprise”, so that a State-owned enterprise which falls under the purview of the Act shall be such enterprise, in which the State is a shareholder or exercises a degree of control, as may be prescribed; and
 
            (c)        so as to clarify some provisions of the Act.
 
 
****
 
 
2.         Cabinet has agreed to the creation of a ‘Village des Artistes’ at Batterie de l’Harmonie, Black River, on the Build Operate Transfer (BOT) model.  The project aims at conserving, restoring and upgrading structures on the site in line with the provisions of the National Heritage Fund Act in order to provide a conducive environment for artists to create works of art, showcase their creations, hold working sessions and conduct workshops.
 
 
****
 
 
3.         Cabinet has agreed to the renaming of the classified Baie du Cap, Chamarel and Case Noyale Road (B104), commonly known as ‘Chemin 52 Contours’, in view of the fact that Chamarel is already a strong tourism brand in itself and famous for its tourist attractions, namely, seven coloured earth, mirador, waterfall and “Rhumerie de Chamarel”.
 
 
****
 
 
4.         Cabinet has taken note of the status of implementation of projects in the Health Sector namely, the construction of the new ENT Hospital at Vacoas, the Flacq Teaching Hospital, the New Eye Care Hospital at Réduit and four Mediclinics at Bel Air, Coromandel, Stanley and Quartier Militaire.
 
 
****


 
5.         Cabinet has taken note that the 7th Session of the Mauritius-EU Political Dialogue was held on 13 June 2019. The Mauritius delegation comprised the Minister of Public Infrastructure and Land Transport, Minister of Foreign Affairs, Regional Integration and International Trade, the Minister of Agro-Industry and Food Security, the Attorney General, Minister of Justice, Human Rights and Institutional Reforms, the Minister of Financial Services and Good Governance, as well as senior officials from different Ministries.  The EU side was headed by HE Ms Marjana Sall, EU Ambassador to Mauritius, and included diplomatic representatives of eight EU Member States, including France and UK.
 
            The meeting discussed various issues related to the current state of play and the future of Mauritius-EU relations bilaterally and within the Cotonou Partnership Agreement (CPA) and post-CPA.
 
****
 
6.         Cabinet has taken note of the activities being organised by the Ministry of Health and Quality of Life on 27 June 2019 to commemorate the International Day Against Drug Abuse and Illicit Trafficking, namely –
 
(a)       a march from Champ de Mars to Jardin de la Compagnie involving the participation of around 1,200 persons, including students from secondary schools in the region of Port Louis, representatives of different Ministries, NGOs as well as other stakeholders;
 
(b)       a national mass media campaign against drug, targeting the whole population and sensitisation of students on the harmful effects of drugs; and
 
(c)        sensitisation on problems of drug at workplace as well as the community through talks and dissemination of brochures.
 
****
 
7.         Cabinet has taken note that the Mauritius Family Planning and Welfare Association Act 2018 which was passed by the National Assembly on 4 December 2018, would be proclaimed shortly and would come into operation on 15 July 2019. 
 
****
 
8.         Cabinet has taken note of the outcome of the recent visit of the Attorney General, Minister of Justice, Human Rights and Institutional Reforms to Rodrigues. The main objective of his visit was to follow up on issues pertaining to Human Rights and to have consultations with various stakeholders to raise their awareness on the subject matter. During the visit, he had, inter alia, working sessions with the Chief Commissioner, Members of the National Assembly and Commissioners of the Rodrigues Regional Assembly. He also had an awareness raising and brainstorming session with the Departmental Heads of the various Commissions of the Rodrigues Regional Assembly, representatives from the Police Force, the Prison Service and relevant NGOs.
 
 
*******

Prime Minister: Budget 2019-2020 focuses on all social categories

 

GIS – 13 June, 2019: Budget 2019-2020, with a series of measures announced to consolidate the productive sectors, to reach a higher social development path and that are based on continuity while expressing Government’s vision, continues to take into consideration and targets all social categories so that we can embrace a brighter future together as a nation.

The Prime Minister, Minister of Home Affairs, External Communications and National Development Unit, Minister of Finance and Economic Development, Mr Pravind Kumar Jugnauth, made this statement, yesterday, during a television interview organised by the Ministry of Finance and Economic Development in collaboration with the Economic Development Board and the Mauritius Broadcasting Corporation in Ebène. His intervention focussed on measures announced in Budget 2019-2020 and aimed at shedding light on some of these measures.
 
Prime Minister Jugnauth recalled that, in line with Government’s innovative development strategy and its aim of transforming the country into a digital economy, Budget 2019-2020 puts emphasis on the need to equip youths with the required skills, and to that end a range of courses will be offered in areas including Artificial Intelligence, Robotics and Fintech. Furthermore, the Budget makes provision for another Governmental measure to boost productivity by maximising the skills and talents of youths through the provision of training that is relevant to the job market. To this end, a National Skills Matching Platform, to assess the training requirement of job applicants and direct them towards the relevant employability scheme with the guarantee of a job at the end, will be created.
 
This Budget, he added, also focusses on several other areas such as: expanding and modernising our infrastructure; dealing with the challenges facing the sugar and manufacturing sectors, including textiles; investing in new pillars of growth; and further opening up and integrating our economy with the rest of the world. It also takes into account the investment in the education, training and other skills needed by the youth, so that they are better prepared for the future. Measures have also been proposed to address the impact of demographic change, promote a more inclusive and equitable society and further address the problem of poverty as well as building greater resilience to the impact of climate change.
 
Speaking about the repayment of public debt, the Prime Minister stated that the statutory requirement was to bring it down to 60 percent as a ratio of Gross Domestic Product by end of June 2021, but that Government plans to reach this target much earlier. This will be done by generating revenue from ongoing projects as well as using part of the accumulated undistributed surplus held at the Bank of Mauritius, as the country’s reserves increased by Rs 117 billion during the last four years to reach Rs 241 billion, that is, by 94 percent, and now representing 11.2 months of import cover. It is recalled that the Bank of Mauritius indicated, in a communique, that it is an acceptable international practice by central banks to hold official foreign exchange reserves in support of a range of objectives including, inter alia, to assist governments in meeting their external debt obligations.
 
With regard to global situations such as Brexit or the increasing price of petroleum products which will have an impact on Mauritius, Prime Minister Jugnauth said that the measures enunciated in Budget 2019-2020 will help to bring more economic growth for the country in forthcoming years. Government will do its uttermost to be as far-sighted as possible so as to cater for the needs of the population, he added.
 

Government Information Service, Prime Minister’s Office, Level 6, New Government Centre, Port Louis, Mauritius. Email: gis@govmu.org  Website: http://gis.govmu.org  Mobile App: Search Gov

SB19-154: Vulnerability Summary for the Week of May 27, 2019

Original release date: June 03, 2019

The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.

The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High – Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 – 10.0

  • Medium – Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 – 6.9

  • Low – Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 – 3.9

Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.

The NCCIC Weekly Vulnerability Summary Bulletin is created using information from the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD). In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

 

High Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7018
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7019
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a buffer errors vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7020
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7025
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7026
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7029
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7031
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7037
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7039
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7040
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 9.3 CVE-2019-7042
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 9.3 CVE-2019-7043
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 9.3 CVE-2019-7044
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7046
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 9.3 CVE-2019-7048
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7050
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7051
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7052
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7054
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7060
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7062
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7066
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7068
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 9.3 CVE-2019-7069
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 9.3 CVE-2019-7070
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 9.3 CVE-2019-7072
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 7.1 CVE-2019-7075
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7076
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 9.3 CVE-2019-7077
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 9.3 CVE-2019-7078
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 9.3 CVE-2019-7079
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a double free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7080
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7082
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7083
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7084
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a buffer errors vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7085
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7086
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7087
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a data leakage (sensitive) vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 7.8 CVE-2019-7089
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20091 and earlier, 2019.010.20091 and earlier, 2017.011.30120 and earlier version, and 2015.006.30475 and earlier have a data leakage (sensitive) vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 7.8 CVE-2019-7815
CONFIRM
adobe — coldfusion ColdFusion versions Update 1 and earlier, Update 7 and earlier, and Update 15 and earlier have a deserialization of untrusted data vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-24 10.0 CVE-2019-7091
CONFIRM
adobe — coldfusion ColdFusion versions Update 2 and earlier, Update 9 and earlier, and Update 17 and earlier have a file upload restriction bypass vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-24 10.0 CVE-2019-7816
CONFIRM
adobe — digital_editions Adobe Digital Editions versions 4.5.10.185749 and below have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-24 10.0 CVE-2019-7095
CONFIRM
adobe — photoshop_cc Adobe Photoshop CC 19.1.7 and earlier, and 20.0.2 and earlier have a heap corruption vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-24 10.0 CVE-2019-7094
CONFIRM
apache — hadoop In Apache Hadoop versions 3.0.0-alpha1 to 3.1.0, 2.9.0 to 2.9.1, and 2.2.0 to 2.8.4, a user who can escalate to yarn user can possibly run arbitrary commands as root user. 2019-05-30 9.0 CVE-2018-8029
BID
CONFIRM
MLIST
auerswald — comfortel_1200_ip_firmware A command injection (missing input validation, escaping) in the ftp upgrade configuration interface on the Auerswald COMfort 1200 IP phone 3.4.4.1-10589 allows an authenticated remote attacker (simple user) — in the same network as the device — to trigger OS commands (like starting telnetd or opening a reverse shell) via a POST request to the web server. 2019-05-29 7.7 CVE-2018-19977
MISC
MISC
auerswald — comfortel_1200_ip_firmware A buffer overflow vulnerability in the DHCP and PPPOE configuration interface of the Auerswald COMfort 1200 IP phone 3.4.4.1-10589 allows a remote attacker (authenticated as simple user in the same network as the device) to trigger remote code execution via a POST request (ManufacturerName parameter) to the web server on the device. The web server is running with root privileges and the injected code will also run with root privileges. 2019-05-29 7.7 CVE-2018-19978
MISC
MISC
bosch — bosch_video_management_system A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Video Recording Manager (VRM), Video Streaming Gateway (VSG), Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The vulnerability potentially allows the unauthorized execution of code in the system via the network interface. 2019-05-29 7.5 CVE-2019-6957
CONFIRM
deltek — maconomy Deltek Maconomy 2.2.5 is prone to local file inclusion via absolute path traversal in the WS.macx1.W_MCS/ PATH_INFO, as demonstrated by a cgi-bin/Maconomy/MaconomyWS.macx1.W_MCS//etc/passwd URI. 2019-05-24 7.5 CVE-2019-12314
MISC
MISC
exponentcms — exponent_cms Exponent CMS version 2.3.9 suffers from a sql injection vulnerability in framework/modules/ecommerce/controllers/cartController.php. 2019-05-24 7.5 CVE-2016-8898
MISC
MISC
exponentcms — exponent_cms Exponent CMS version 2.3.9 suffers from a Object Injection vulnerability in framework/modules/core/controllers/expTagController.php related to change_tags. 2019-05-24 7.5 CVE-2016-8900
MISC
MISC
firejail_project — firejail Firejail before 0.9.60 allows truncation (resizing to length 0) of the firejail binary on the host by running exploit code inside a firejail sandbox and having the sandbox terminated. To succeed, certain conditions need to be fulfilled: The jail (with the exploit code inside) needs to be started as root, and it also needs to be terminated as root from the host (either by stopping it ungracefully (e.g., SIGKILL), or by using the –shutdown control command). This is similar to CVE-2019-5736. 2019-05-31 9.3 CVE-2019-12499
MISC
fortinet — forticlient An Unsafe Search Path vulnerability in FortiClient Online Installer (Windows version before 6.0.6) may allow an unauthenticated, remote attacker with control over the directory in which FortiClientOnlineInstaller.exe resides to execute arbitrary code on the system via uploading malicious .dll files in that directory. 2019-05-28 9.3 CVE-2019-5589
CONFIRM
gitlab — gitlab An issue was discovered in GitLab Community and Enterprise Edition before 11.6.10, 11.7.x before 11.7.6, and 11.8.x before 11.8.1. It allows Uncontrolled Resource Consumption (issue 2 of 2). 2019-05-29 7.8 CVE-2019-9177
MISC
gitlab — gitlab An issue was discovered in GitLab Community and Enterprise Edition before 11.6.10, 11.7.x before 11.7.6, and 11.8.x before 11.8.1. It has Incorrect Access Control (issue 1 of 5). 2019-05-29 7.5 CVE-2019-9218
MISC
gitlab — gitlab An issue was discovered in GitLab Community and Enterprise Edition before 11.6.10, 11.7.x before 11.7.6, and 11.8.x before 11.8.1. It has Insecure Permissions. 2019-05-29 7.5 CVE-2019-9485
MISC
MISC
gitlab — gitlab An issue was discovered in GitLab Community and Enterprise Edition 10.x (starting from 10.8) and 11.x before 11.6.10, 11.7.x before 11.7.6, and 11.8.x before 11.8.1. It has Incorrect Access Control. 2019-05-29 7.5 CVE-2019-9732
MISC
MISC
gnome — glib file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used. 2019-05-29 7.5 CVE-2019-12450
MISC
gnome — gvfs An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles file ownership because setfsuid is not used. 2019-05-29 7.5 CVE-2019-12447
MISC
gnome — gvfs An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles a file’s user and group ownership during move (and copy with G_FILE_COPY_ALL_METADATA) operations from admin:// to file:// URIs, because root privileges are unavailable. 2019-05-29 10.0 CVE-2019-12449
MISC
gog — galaxy An exploitable local privilege elevation vulnerability exists in the file system permissions of the `Temp` directory in GOG Galaxy 1.2.48.36 (Windows 64-bit Installer). An attacker can overwrite executables of the Desktop Galaxy Updater to exploit this vulnerability and execute arbitrary code with SYSTEM privileges. 2019-05-30 7.2 CVE-2018-4048
MISC
karamasoft — ultimateeditor Karamasoft UltimateEditor 1 does not ensure that an uploaded file is an image or document (neither file types nor extensions are restricted). The attacker must use the Attach icon to perform an upload. An uploaded file is accessible under the UltimateEditorInclude/UserFiles/ URI. 2019-05-24 7.5 CVE-2019-12150
MISC
MISC
linux — linux_kernel An issue was discovered in wcd9335_codec_enable_dec in sound/soc/codecs/wcd9335.c in the Linux kernel through 5.1.5. It uses kstrndup instead of kmemdup_nul, which allows attackers to have an unspecified impact via unknown vectors. 2019-05-30 7.2 CVE-2019-12454
MISC
MISC
linux — linux_kernel An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a “double fetch” vulnerability. 2019-05-30 7.2 CVE-2019-12456
MISC
MISC
mlmsoftwarez — add_clicking_mlm_software SQL injection exists in ADD Clicking MLM Software 1.0, Binary MLM Software 1.0, Level MLM Software 1.0, Singleleg MLM Software 1.0, Autopool MLM Software 1.0, Investment MLM Software 1.0, Bidding MLM Software 1.0, Moneyorder MLM Software 1.0, Repurchase MLM Software 1.0, and Gift MLM Software 1.0 via the member/readmsg.php msg_id parameter, the member/tree.php pid parameter, or the member/downline.php m_id parameter. 2019-05-24 7.5 CVE-2018-17843
MISC
MISC
mobotix — s14_firmware There is a lack of CSRF countermeasures on MOBOTIX S14 MX-V4.2.1.61 cameras, as demonstrated by adding an admin account via the /admin/access URI. 2019-05-31 9.3 CVE-2019-12502
MISC
precurio — precurio The Xinha plugin in Precurio 2.1 allows Directory Traversal, with resultant arbitrary code execution, via ExtendedFileManager/Classes/ExtendedFileManager.php because ExtendedFileManager can be used to rename the .htaccess file that blocks .php uploads. 2019-05-24 7.5 CVE-2016-10759
MISC
MISC
qualcomm — ipq4019_firmware Data length received from firmware is not validated against the max allowed size which can result in buffer overflow. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, QCS605, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 712 / SD 710 / SD 670, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24 2019-05-24 7.2 CVE-2018-11925
CONFIRM
qualcomm — ipq4019_firmware Improper check before assigning value can lead to integer overflow in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8064, IPQ8074, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA4020, QCA6174A, QCA6564, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA8081, QCA9377, QCA9379, QCA9531, QCA9558, QCA9563, QCA9880, QCA9886, QCA9980, QCN5502, QCS605, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 600, SD 625, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM630, SDM660, SDX20, SDX24, SM7150, Snapdragon_High_Med_2016, SXR1130 2019-05-24 7.2 CVE-2018-11968
CONFIRM
qualcomm — ipq8074_firmware Lack of check on length parameter may cause buffer overflow while processing WMI commands in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ8074, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6564, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA8081, QCA9377, QCA9379, QCA9886, QCS605, SD 210/SD 212/SD 205, SD 425, SD 600, SD 625, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM630, SDM660, SDX20, SDX24, SM7150, SXR1130 2019-05-24 7.2 CVE-2018-11928
CONFIRM
qualcomm — mdm9150_firmware Improper input validation on input which is used as an array index will lead to an out of bounds issue while processing AP find event from firmware in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, SD 210/SD 212/SD 205, SD 625, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 845 / SD 850, SD 855, SDX20, SDX24, SM7150 2019-05-24 7.2 CVE-2018-11927
CONFIRM
qualcomm — mdm9150_firmware Improper input validation on input data which is used to locate and copy the additional IEs in WLAN function can lead to potential integer truncation issue in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCS605, Qualcomm 215, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 675, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24, SM7150 2019-05-24 10.0 CVE-2018-11930
CONFIRM
qualcomm — mdm9150_firmware Lack of input validation before copying can lead to a buffer over read in WLAN function in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, QCS605, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24, SM7150 2019-05-24 10.0 CVE-2018-11937
CONFIRM
qualcomm — mdm9150_firmware Lack of check in length before using memcpy in WLAN function can lead to OOB access in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCS605, SD 625, SD 636, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24, SXR1130 2019-05-24 10.0 CVE-2018-11940
CONFIRM
qualcomm — mdm9150_firmware Failure to initialize the extra buffer can lead to an out of buffer access in WLAN function in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCS605, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24 2019-05-24 10.0 CVE-2018-11949
CONFIRM
qualcomm — mdm9150_firmware While processing ssid IE length from remote AP, possible out-of-bounds access may occur due to crafted ssid IE length in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 650/52, SD 820, SD 820A, SDM439, SDX20 2019-05-24 10.0 CVE-2018-11953
CONFIRM
qualcomm — mdm9150_firmware Signature verification of the skel library could potentially be disabled as the memory region on the remote subsystem in which the library is loaded is allocated from userspace currently in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24 2019-05-24 7.2 CVE-2018-11967
CONFIRM
qualcomm — mdm9150_firmware Unchecked OTA field in GNSS XTRA3 lead to integer overflow and then buffer overflow in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9615, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 600, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SDA660, SDM439, SDM630, SDM660, SDX20, SM7150, Snapdragon_High_Med_2016, SXR1130 2019-05-24 10.0 CVE-2018-13886
CONFIRM
qualcomm — mdm9150_firmware Untrusted header fields in GNSS XTRA3 function can lead to integer overflow in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9635M, MDM9650, MDM9655, MSM8909W, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 600, SD 625, SD 632, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 835, SD 845 / SD 850, SDA660, SDM439, SDM630, SDM660, SDX20, SM7150, SXR1130 2019-05-24 10.0 CVE-2018-13887
CONFIRM
qualcomm — mdm9150_firmware Due to the missing permissions on several content providers of the RCS app in its android manifest file will lead to an unprivileged access to phone in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20 2019-05-24 7.2 CVE-2018-13895
CONFIRM
qualcomm — mdm9150_firmware Processing messages after error may result in user after free memory fault in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9650, MSM8909W, QCS605, Qualcomm 215, SD 425, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24, SM7150 2019-05-24 7.2 CVE-2018-13899
CONFIRM
qualcomm — mdm9206_firmware Improper authentication can happen on Remote command handling due to inappropriate handling of events in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearables in MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SM7150, Snapdragon_High_Med_2016, SXR1130 2019-05-24 7.5 CVE-2018-11271
CONFIRM
qualcomm — mdm9206_firmware Index of array is processed in a wrong way inside a while loop and result in invalid index (-1 or something else) leads to out of bound memory access. in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA9377, QCA9379, QCA9886, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 820, SD 820A, SD 835, SDX20, SDX24, Snapdragon_High_Med_2016 2019-05-24 10.0 CVE-2018-11936
CONFIRM
qualcomm — mdm9206_firmware While updating blacklisting region shared buffered memory region is not validated against newly updated black list, causing boot-up to be compromised in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9206, MDM9607, MDM9650, MDM9655, QCS605, SD 210/SD 212/SD 205, SD 410/12, SD 615/16/SD 415, SD 712 / SD 710 / SD 670, SD 835, SD 845 / SD 850, SD 8CX, SXR1130 2019-05-24 7.2 CVE-2018-12012
CONFIRM
qualcomm — mdm9206_firmware Improper authentication in locked memory region can lead to unprivilged access to the memory in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9206, MDM9607, MDM9650, MDM9655, QCS605, SD 210/SD 212/SD 205, SD 410/12, SD 615/16/SD 415, SD 636, SD 712 / SD 710 / SD 670, SD 835, SD 845 / SD 850, SD 8CX, SDA660, SDM630, SDM660, SXR1130 2019-05-24 7.2 CVE-2018-12013
CONFIRM
qualcomm — mdm9206_firmware Use-after-free condition due to Improper handling of hrtimers when the PMU driver tries to access its events in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MDM9206, MDM9607, MDM9650, MSM8909W, QCS605, Qualcomm 215, SD 425, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 712 / SD 710 / SD 670, SD 820A, SD 845 / SD 850, SD 855, SDM439, SDM630, SDM660, SDX24 2019-05-24 7.2 CVE-2018-13920
CONFIRM
qualcomm — mdm9206_firmware Error in parsing PMT table frees the memory allocated for the map section but does not reset the context map section reference causing heap use after free issue in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearables in MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 600, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130 2019-05-24 10.0 CVE-2018-13925
CONFIRM
qualcomm — mdm9206_firmware Possible integer underflow can happen when calculating length of elementary stream info from invalid section length which is later used to read from input buffer in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearable in MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 600, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016 2019-05-24 10.0 CVE-2019-2244
CONFIRM
qualcomm — mdm9206_firmware Possible integer underflow can happen when calculating length of elementary stream map from invalid packet length which is later used to read from input buffer in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 600, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SM7150, Snapdragon_High_Med_2016 2019-05-24 10.0 CVE-2019-2245
CONFIRM
qualcomm — qcs605_firmware Kernel can write to arbitrary memory address passed by user while freeing/stopping a thread in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in QCS605, SD 675, SD 712 / SD 710 / SD 670, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SM7150, SXR1130 2019-05-24 7.2 CVE-2019-2250
CONFIRM
s9y — serendipity serendipity_moveMediaDirectory in Serendipity 2.0.3 allows remote attackers to upload and execute arbitrary PHP code because it mishandles an extensionless filename during a rename, as demonstrated by “php” as a filename. 2019-05-24 7.5 CVE-2016-10752
MISC
MISC
sqlite — sqlite SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables. 2019-05-30 7.5 CVE-2019-8457
MISC
MISC
synacor — zimbra_collaboration_suite ZxChat (aka ZeXtras Chat), as used for zimbra-chat and zimbra-talk in Synacor Zimbra Collaboration Suite 8.7 and 8.8 and in other products, allows XXE attacks, as demonstrated by a crafted XML request to mailboxd. 2019-05-29 7.5 CVE-2018-20160
MISC
MISC
MISC
synacor — zimbra_collaboration_suite Synacor Zimbra Collaboration Suite 8.7.x through 8.8.11 allows insecure object deserialization in the IMAP component. 2019-05-29 7.5 CVE-2019-6980
MISC
MISC
synacor — zimbra_collaboration_suite mailboxd component in Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10 has an XML External Entity injection (XXE) vulnerability. 2019-05-29 7.5 CVE-2019-9670
MISC
MISC
MISC
MISC
EXPLOIT-DB
yealink — ultra-elegant_ip_phone_sip-t41p_firmware The network diagnostic function (ping) in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) allows a remote authenticated attacker to trigger OS commands or open a reverse shell via command injection. 2019-05-29 9.0 CVE-2018-16217
MISC
MISC
yealink — ultra-elegant_ip_phone_sip-t41p_firmware The diagnostics web interface in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) does not validate (escape) the path information (path traversal), which allows an authenticated remote attacker to get access to privileged information (e.g., /etc/passwd) via path traversal (relative path information in the file parameter of the corresponding POST request). 2019-05-29 7.7 CVE-2018-16221
MISC
MISC

Back to top

 

Medium Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
abantecart — abantecart AbanteCart 1.2.8 allows SQL Injection via the source_language parameter to admin/controller/pages/localisation/language.php and core/lib/language_manager.php, or via POST data to admin/controller/pages/tool/backup.php and admin/model/tool/backup.php. 2019-05-24 4.0 CVE-2016-10755
MISC
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7021
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7022
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7023
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7024
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7028
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an integer overflow vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7030
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7032
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7033
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7034
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7035
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7036
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7038
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a security bypass vulnerability. Successful exploitation could lead to privilege escalation. 2019-05-24 6.8 CVE-2019-7041
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 4.3 CVE-2019-7045
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7047
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 4.3 CVE-2019-7049
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7053
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7055
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7056
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7057
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7058
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7059
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7063
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7064
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7065
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7067
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 4.3 CVE-2019-7071
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 4.3 CVE-2019-7073
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 4.3 CVE-2019-7074
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 5.0 CVE-2019-7081
CONFIRM
adobe — coldfusion ColdFusion versions Update 1 and earlier, Update 7 and earlier, and Update 15 and earlier have a cross site scripting vulnerability. Successful exploitation could lead to information disclosure . 2019-05-24 4.3 CVE-2019-7092
CONFIRM
adobe — creative_cloud Creative Cloud Desktop Application (installer) versions 4.7.0.400 and earlier have an insecure library loading (dll hijacking) vulnerability. Successful exploitation could lead to privilege escalation. 2019-05-24 6.8 CVE-2019-7093
CONFIRM
adobe — experience_manager_forms Adobe Experience Manager Forms versions 6.2, 6.3 and 6.4 have a stored cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure. 2019-05-29 4.3 CVE-2019-7129
CONFIRM
adobe — flash_player Flash Player Desktop Runtime versions 32.0.0.114 and earlier, Flash Player for Google Chrome versions 32.0.0.114 and earlier, and Flash Player for Microsoft Edge and Internet Explorer 11 versions 32.0.0.114 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 4.3 CVE-2019-7090
CONFIRM
afian — filerun FileRun 2019.05.21 allows images/extjs Directory Listing. 2019-05-30 5.0 CVE-2019-12457
MISC
MISC
MISC
afian — filerun FileRun 2019.05.21 allows css/ext-ux Directory Listing. 2019-05-30 5.0 CVE-2019-12458
MISC
MISC
MISC
afian — filerun FileRun 2019.05.21 allows customizables/plugins/audio_player Directory Listing. 2019-05-30 5.0 CVE-2019-12459
MISC
MISC
MISC
ampache — ampache Ampache 3.8.3 allows PHP Object Instantiation via democratic.ajax.php and democratic.class.php. 2019-05-24 6.5 CVE-2017-18375
MISC
apache — camel Apache Camel prior to 2.24.0 contains an XML external entity injection (XXE) vulnerability (CWE-611) due to using an outdated vulnerable JSON-lib library. This affects only the camel-xmljson component, which was removed. 2019-05-28 5.0 CVE-2019-0188
JVN
MLIST
BID
CONFIRM
MLIST
apache — tomcat The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website. 2019-05-28 4.3 CVE-2019-0221
FULLDISC
CONFIRM
MLIST
bacnet_protocol_stack_project — bacnet_protocol_stack BACnet Protocol Stack through 0.8.6 could allow an unauthenticated, remote attacker to cause a denial of service (bacserv daemon crash) because there is an invalid read in bacdcode.c during parsing of alarm tag numbers. 2019-05-30 5.0 CVE-2019-12480
MISC
blueprism — robotic_process_automation In AutomateAppCore.dll in Blue Prism Robotic Process Automation 6.4.0.8445, a vulnerability in access control can be exploited to escalate privileges. The vulnerability allows for abusing the application for fraud or unauthorized access to certain information. The attack requires a valid user account to connect to the Blue Prism server, but the roles associated to this account are not required to have any permissions. First of all, the application files are modified to grant full permissions on the client side. In a test environment (or his own instance of the software) an attacker is able to grant himself full privileges also on the server side. He can then, for instance, create a process with malicious behavior and export it to disk. With the modified client, it is possible to import the exported file as a release and overwrite any existing process in the database. Eventually, the bots execute the malicious process. The server does not check the user’s permissions for the aforementioned actions, such that a modification of the client software enables this kind of attack. Possible scenarios may involve changing bank accounts or setting passwords. 2019-05-24 6.5 CVE-2019-11875
MISC
MISC
bosch — bosch_video_management_system A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The RCP+ network port allows access without authentication. Adding authentication feature to the respective library fixes the issue. The issue is classified as “CWE-284: Improper Access Control.” This vulnerability, for example, allows a potential attacker to delete video or read video data. 2019-05-29 6.4 CVE-2019-6958
CONFIRM
ca — risk_authentication A UI redress vulnerability in the administrative user interface of CA Technologies CA Strong Authentication 9.0.x, 8.2.x, 8.1.x, 8.0.x, 7.1.x and CA Risk Authentication 9.0.x, 8.2.x, 8.1.x, 8.0.x, 3.1.x may allow a remote attacker to gain sensitive information in some cases. 2019-05-28 4.0 CVE-2019-7393
MISC
FULLDISC
BID
BUGTRAQ
CONFIRM
ca — risk_authentication A privilege escalation vulnerability in the administrative user interface of CA Technologies CA Strong Authentication 9.0.x, 8.2.x, 8.1.x, 8.0.x, 7.1.x and CA Risk Authentication 9.0.x, 8.2.x, 8.1.x, 8.0.x, 3.1.x allows an authenticated attacker to gain additional privileges in some cases where an account has customized and limited privileges. 2019-05-28 6.5 CVE-2019-7394
MISC
FULLDISC
BID
BUGTRAQ
CONFIRM
cloudera — cloudera_manager An issue was discovered in Cloudera Manager before 5.13.4, 5.14.x before 5.14.4, and 5.15.x before 5.15.1. A read-only user can access sensitive cluster information. 2019-05-24 4.0 CVE-2018-10815
MISC
CONFIRM
computrols — computrols_building_automation_software Computrols CBAS 18.0.0 allows Cross-Site Request Forgery. 2019-05-24 6.8 CVE-2019-10847
MISC
MISC
computrols — computrols_building_automation_software Computrols CBAS 18.0.0 allows Username Enumeration. 2019-05-24 5.0 CVE-2019-10848
MISC
MISC
dollarshaveclub — shave XSS exists in Shave before 2.5.3 because output encoding is mishandled during the overwrite of an HTML element. 2019-05-24 4.3 CVE-2019-12313
MISC
MISC
MISC
doxygen — doxygen Insufficient sanitization of the query parameter in templates/html/search_opensearch.php could lead to reflected cross-site scripting or iframe injection. 2019-05-24 4.3 CVE-2016-10245
SUSE
BID
MISC
MISC
MISC
MLIST
drupal — drupal In PrestaShop 1.7.5.2, the shop_country parameter in the install/index.php installation script/component is affected by Reflected XSS. Exploitation by a malicious actor requires the user to follow the initial stages of the setup (accepting terms and conditions) before executing the malicious link. 2019-05-24 4.3 CVE-2019-11876
MISC
MISC
dynmap_project — dynmap In Webbukkit Dynmap 3.0-beta-3, with Spigot 1.13.2, due to a missing login check in servlet/MapStorageHandler.java, an attacker can see a map image without login despite an enabled login-required setting. 2019-05-28 5.0 CVE-2019-12395
MISC
MISC
MISC
e107 — e107 e107 2.1.2 allows PHP Object Injection with resultant SQL injection, because usersettings.php uses unserialize without an HMAC. 2019-05-24 6.5 CVE-2016-10753
MISC
MISC
eficode — influxdb Jenkins InfluxDB Plugin 1.21 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. 2019-05-31 4.0 CVE-2019-10329
MLIST
MISC
emerson — ovation_ocr400_firmware In Emerson Ovation OCR400 Controller 3.3.1 and earlier, a heap-based buffer overflow vulnerability in the embedded third-party FTP server involves improper handling of a long command to the FTP service, which may cause memory corruption that halts the controller or leads to remote code execution and escalation of privileges. 2019-05-28 6.5 CVE-2019-10965
BID
MISC
emerson — ovation_ocr400_firmware In Emerson Ovation OCR400 Controller 3.3.1 and earlier, a stack-based buffer overflow vulnerability in the embedded third-party FTP server involves improper handling of a long file name from the LIST command to the FTP service, which may cause the service to overwrite buffers, leading to remote code execution and escalation of privileges. 2019-05-28 6.5 CVE-2019-10967
BID
MISC
eventum_project — eventum An issue was discovered in Eventum 3.5.0. /htdocs/post_note.php has XSS via the garlic_prefix parameter. 2019-05-24 4.3 CVE-2018-12624
MISC
CONFIRM
fedoraproject — fedora Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://intel.ly/2w0UaVx 2019-05-30 4.7 CVE-2018-12126
FEDORA
CONFIRM
fedoraproject — fedora Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://intel.ly/2w0UaVx 2019-05-30 4.7 CVE-2018-12127
FEDORA
CONFIRM
fedoraproject — fedora Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://intel.ly/2w0UaVx 2019-05-30 4.7 CVE-2018-12130
FEDORA
CONFIRM
fedoraproject — fedora Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://intel.ly/2w0UaVx 2019-05-30 4.7 CVE-2019-11091
FEDORA
CONFIRM
fortinet — fortianalyzer An Improper Neutralization of Script-Related HTML Tags in Fortinet FortiAnalyzer 5.6.0 and below and FortiManager 5.6.0 and below allows an attacker to send DHCP request containing malicious scripts in the HOSTNAME parameter. The malicious script code is executed while viewing the logs in FortiAnalyzer and FortiManager (with FortiAnalyzer feature enabled). 2019-05-28 4.3 CVE-2018-13375
CONFIRM
fortinet — forticlient A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and earlier allows attacker to execute unauthorized code or commands via the command injection. 2019-05-30 4.6 CVE-2018-13368
CONFIRM
fortinet — forticlient A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and earlier allows attackers to execute unauthorized code or commands via the named pipe responsible for Forticlient updates. 2019-05-30 4.6 CVE-2018-9191
CONFIRM
fortinet — forticlient A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and earlier allows attacker to execute unauthorized code or commands via the parsing of the file. 2019-05-30 4.6 CVE-2018-9193
CONFIRM
fortinet — fortios An Information Exposure vulnerability in Fortinet FortiOS 6.0.1, 5.6.5 and below, allow attackers to learn private IP as well as the hostname of FortiGate via Application Control Block page. 2019-05-29 5.0 CVE-2018-13365
CONFIRM
fortinet — fortios A heap buffer overflow in Fortinet FortiOS all versions below 6.0.5 in the SSL VPN web portal may cause the SSL VPN web service termination for logged in users due to a failure to properly handle javascript href data when proxying webpages. 2019-05-29 4.3 CVE-2018-13383
CONFIRM
freeradius — freeradius It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. 2019-05-24 6.9 CVE-2019-10143
CONFIRM
CONFIRM
gitea — gitea Jenkins Gitea Plugin 1.1.1 and earlier did not implement trusted revisions, allowing attackers without commit access to the Git repo to change Jenkinsfiles even if Jenkins is configured to consider them to be untrusted. 2019-05-31 5.0 CVE-2019-10330
MLIST
MISC
gitlab — gitlab An issue was discovered in GitLab Community and Enterprise Edition 10.x and 11.x before 11.5.10, 11.6.x before 11.6.8, and 11.7.x before 11.7.3. It has Incorrect Access Control, 2019-05-29 4.0 CVE-2019-7549
MISC
MISC
gitlab — gitlab An issue was discovered in GitLab Community and Enterprise Edition 11.x before 11.7.7 and 11.8.x before 11.8.3. It allows Information Disclosure. 2019-05-29 4.0 CVE-2019-9866
MISC
glyphandcog — xpdfreader A stack-based buffer over-read exists in FoFiTrueType::dumpString in fofi/FoFiTrueType.cc in Xpdf 4.01.01. It can, for example, be triggered by sending crafted TrueType data in a PDF document to the pdftops tool. It might allow an attacker to cause Denial of Service or leak memory data into dump content. 2019-05-27 5.8 CVE-2019-12360
MISC
glyphandcog — xpdfreader A stack-based buffer over-read exists in PostScriptFunction::transform in Function.cc in Xpdf 4.01.01 because GfxSeparationColorSpace and GfxDeviceNColorSpace mishandle tint transform functions. It can, for example, be triggered by sending a crafted PDF document to the pdftops tool. It might allow an attacker to cause Denial of Service or leak memory data. 2019-05-30 5.8 CVE-2019-12493
MISC
gnome — gvfs An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c has race conditions because the admin backend doesn’t implement query_info_on_read/write. 2019-05-29 6.8 CVE-2019-12448
MISC
gpac — gpac An issue was discovered in GPAC 0.7.1. There is a NULL pointer dereference in the function GetESD at isomedia/track.c in libgpac.a, as demonstrated by MP4Box. 2019-05-30 4.3 CVE-2019-12481
MISC
gpac — gpac An issue was discovered in GPAC 0.7.1. There is a NULL pointer dereference in the function gf_isom_get_original_format_type at isomedia/drm_sample.c in libgpac.a, as demonstrated by MP4Box. 2019-05-30 5.0 CVE-2019-12482
MISC
gpac — gpac An issue was discovered in GPAC 0.7.1. There is a heap-based buffer overflow in the function ReadGF_IPMPX_RemoveToolNotificationListener in odf/ipmpx_code.c in libgpac.a, as demonstrated by MP4Box. 2019-05-30 6.8 CVE-2019-12483
MISC
haxx — curl An integer overflow in curl’s URL API results in a buffer overflow in libcurl 7.62.0 to and including 7.64.1. 2019-05-28 4.3 CVE-2019-5435
CONFIRM
haxx — libcurl A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1. 2019-05-28 4.6 CVE-2019-5436
CONFIRM
heidelberg — prinect_archiver A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Heidelberg Prinect Archiver v2013 release 1.0. 2019-05-24 4.3 CVE-2019-10685
MISC
MISC
horde — groupware Remote code execution was discovered in Horde Groupware Webmail 5.2.22 and 5.2.17. Horde/Form/Type.php contains a vulnerable class that handles image upload in forms. When the Horde_Form_Type_image method onSubmit() is called on uploads, it invokes the functions getImage() and _getUpload(), which uses unsanitized user input as a path to save the image. The unsanitized POST parameter object[photo][img][file] is saved in the $upload[img][file] PHP variable, allowing an attacker to manipulate the $tmp_file passed to move_uploaded_file() to save the uploaded file. By setting the parameter to (for example) ../usr/share/horde/static/bd.php, one can write a PHP backdoor inside the web root. The static/ destination folder is a good candidate to drop the backdoor because it is always writable in Horde installations. (The unsanitized POST parameter went probably unnoticed because it’s never submitted by the forms, which default to securely using a random path.) 2019-05-29 6.5 CVE-2019-9858
MISC
MISC
hybridgroup — gobot An issue was discovered in Hybrid Group Gobot before 1.13.0. The mqtt subsystem skips verification of root CA certificates by default. 2019-05-31 5.0 CVE-2019-12496
MISC
MISC
ibm — api_connect IBM API Connect 5.0.0.0 through 5.0.8.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 159944. 2019-05-29 5.0 CVE-2019-4256
BID
XF
CONFIRM
ibm — qradar_security_information_and_event_manager IBM QRadar SIEM 7.2.8 WinCollect could allow an attacker to obtain sensitive information by spoofing a trusted entity using man in the middle techniques due to not validating or incorrectly validating a certificate. IBM X-Force ID: 160072. 2019-05-29 4.3 CVE-2019-4264
BID
XF
CONFIRM
incsub — hustle The Hustle (aka wordpress-popup) plugin 6.0.7 for WordPress is vulnerable to CSV Injection as it allows for injecting malicious code into a pop-up window. Successful exploitation grants an attacker with a right to execute malicious code on the administrator’s computer through Excel functions as the plugin does not sanitize the user’s input and allows insertion of any text. 2019-05-29 6.8 CVE-2019-11872
MISC
MISC
MISC
jenkins — pipeline_maven_integration An XML external entities (XXE) vulnerability in Jenkins Pipeline Maven Integration Plugin 1.7.0 and earlier allowed attackers able to control a temporary directory’s content on the agent running the Maven build to have Jenkins parse a maliciously crafted XML file that uses external entities for extraction of secrets from the Jenkins master, server-side request forgery, or denial-of-service attacks. 2019-05-31 5.5 CVE-2019-10327
MLIST
MISC
jenkins — pipeline_remote_loader Jenkins Pipeline Remote Loader Plugin 1.4 and earlier provided a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection. 2019-05-31 6.5 CVE-2019-10328
MLIST
MISC
jenkins — warnings_next_generation A cross-site request forgery vulnerability in Jenkins Warnings NG Plugin 5.0.0 and earlier allowed attackers to reset warning counts for future builds. 2019-05-31 4.3 CVE-2019-10326
MLIST
MISC
jfrog — artifactory A cross-site request forgery vulnerability in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. 2019-05-31 4.3 CVE-2019-10321
MLIST
MISC
jfrog — artifactory A missing permission check in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. 2019-05-31 4.0 CVE-2019-10322
MLIST
MISC
jfrog — artifactory A missing permission check in Jenkins Artifactory Plugin 3.2.2 and earlier in various ‘fillCredentialsIdItems’ methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins. 2019-05-31 4.0 CVE-2019-10323
MLIST
MISC
jfrog — artifactory A cross-site request forgery vulnerability in Jenkins Artifactory Plugin 3.2.2 and earlier in ReleaseAction#doSubmit, GradleReleaseApiAction#doStaging, MavenReleaseApiAction#doStaging, and UnifiedPromoteBuildAction#doSubmit allowed attackers to schedule a release build, perform release staging for Gradle and Maven projects, and promote previously staged builds, respectively. 2019-05-31 4.3 CVE-2019-10324
MLIST
MISC
kibokolabs — hostel XSS exists in the Kiboko Hostel plugin before 1.1.4 for WordPress. 2019-05-27 4.3 CVE-2019-12345
MISC
kliqqi — kliqqi_cms Kliqqi 3.0.0.5 allows CSRF with resultant Arbitrary File Upload because module.php?module=upload can be used to configure the uploading of .php files, and then modules/upload/upload_main.php can be used for the upload itself. 2019-05-24 6.8 CVE-2016-10756
MISC
MISC
libreswan — libreswan In Libreswan before 3.28, an assertion failure can lead to a pluto IKE daemon restart. An attacker can trigger a NULL pointer dereference by sending two IKEv2 packets (init_IKE and delete_IKE) in 3des_cbc mode to a Libreswan server. This affects send_v2N_spi_response_from_state in programs/pluto/ikev2_send.c when built with Network Security Services (NSS). 2019-05-24 5.0 CVE-2019-12312
MISC
MISC
MISC
linux — linux_kernel An issue was discovered in ip6_ra_control in net/ipv6/ipv6_sockglue.c in the Linux kernel through 5.1.5. There is an unchecked kmalloc of new_ra, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). 2019-05-27 4.9 CVE-2019-12378
BID
MISC
MISC
linux — linux_kernel An issue was discovered in con_insert_unipair in drivers/tty/vt/consolemap.c in the Linux kernel through 5.1.5. There is a memory leak in a certain case of an ENOMEM outcome of kmalloc. 2019-05-27 4.9 CVE-2019-12379
BID
MISC
linux — linux_kernel An issue was discovered in ip_ra_control in net/ipv4/ip_sockglue.c in the Linux kernel through 5.1.5. There is an unchecked kmalloc of new_ra, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). 2019-05-27 4.9 CVE-2019-12381
BID
MISC
MISC
linux — linux_kernel An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). 2019-05-27 4.9 CVE-2019-12382
BID
MISC
MISC
linux — linux_kernel An issue was discovered in sunxi_divs_clk_setup in drivers/clk/sunxi/clk-sunxi.c in the Linux kernel through 5.1.5. There is an unchecked kstrndup of derived_name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). 2019-05-30 4.9 CVE-2019-12455
MISC
MISC
netgate — pfsense In pfSense 2.4.4-p3, a stored XSS vulnerability occurs when attackers inject a payload into the Name or Description field via an acme_accountkeys_edit.php action. The vulnerability occurs due to input validation errors. 2019-05-29 4.3 CVE-2019-12347
MISC
MISC
CONFIRM
MISC
MISC
oracle — enterprise_manager_ops_center Vulnerability in the Enterprise Manager Ops Center component of Oracle Enterprise Manager Products Suite (subcomponent: Services Integration). The supported version that is affected is 12.3.3. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Enterprise Manager Ops Center. While the vulnerability is in Enterprise Manager Ops Center, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Enterprise Manager Ops Center. CVSS 3.0 Base Score 6.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H). 2019-05-24 6.3 CVE-2019-2726
MISC
osclass — osclass osClass 3.6.1 allows oc-admin/plugins.php Directory Traversal via the plugin parameter. This is exploitable for remote PHP code execution because an administrator can upload an image that contains PHP code in the EXIF data via index.php?page=ajax&action=ajax_upload. 2019-05-24 6.5 CVE-2016-10751
MISC
MISC
phome — empirecms EmpireCMS 7.5.0 has XSS via the from parameter to e/member/doaction.php, as demonstrated by a CSRF payload that changes the dynamic page template. The attacker can choose to resend the e/template/member/regsend.php registered activation mail page. 2019-05-27 4.3 CVE-2019-12361
MISC
phome — empirecms EmpireCMS 7.5.0 has XSS via the HTTP Referer header to e/member/doaction.php. 2019-05-27 4.3 CVE-2019-12362
MISC
phpkit — phpkit PHPKIT 1.6.6 allows arbitrary File Upload, as demonstrated by a .php file to pkinc/admin/mediaarchive.php and pkinc/func/default.php via the image_name parameter. 2019-05-24 6.5 CVE-2016-10758
MISC
MISC
phprelativepath_project — phprelativepath An XSS vulnerability exists in PHPRelativePath (aka Relative Path) through 1.0.2 via the RelativePath.Example1.php path parameter. 2019-05-31 4.3 CVE-2019-12507
MISC
MISC
qemu — qemu interface_release_resource in hw/display/qxl.c in QEMU 4.0.0 has a NULL pointer dereference. 2019-05-24 5.0 CVE-2019-12155
CONFIRM
MISC
BUGTRAQ
DEBIAN
qualcomm — 215_firmware Buffer overflow can occur if invalid header tries to overwrite the existing buffer which fix size allocation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 820, SD 820A, SD 845 / SD 850, SDM439, SDM660, SDX20 2019-05-24 4.6 CVE-2019-2248
CONFIRM
qualcomm — ipq8074_firmware ECDSA signature code leaks private keys from secure world to non-secure world in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in IPQ8074, MDM9150, MDM9206, MDM9607, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCA8081, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130 2019-05-24 4.9 CVE-2018-11976
CONFIRM
qualcomm — mdm9150_firmware Improper buffer length check before copying can lead to integer overflow and then a buffer overflow in WMA event handler in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, QCS605, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24 2019-05-24 4.6 CVE-2018-11923
CONFIRM
qualcomm — mdm9150_firmware Improper buffer length validation in WLAN function can lead to a potential integer oveflow issue in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCS605, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24, SM7150 2019-05-24 4.6 CVE-2018-11924
CONFIRM
qualcomm — mdm9150_firmware An unprivileged user can issue a binder call and cause a system halt in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24, SM7150 2019-05-24 4.9 CVE-2018-12005
CONFIRM
qualcomm — mdm9150_firmware Possible memory overread may be lead to access of sensitive data in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9650, MDM9655, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 835, SD 845 / SD 850, SDA660, SDM439, SDM630, SDM660, SDX20, SM7150, SXR1130 2019-05-24 4.9 CVE-2018-13885
CONFIRM
qualcomm — mdm9150_firmware Possibility of double free issue while running multiple instances of smp2p test because of proper protection is missing while using global variable in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24 2019-05-24 4.6 CVE-2019-2247
CONFIRM
qualcomm — mdm9206_firmware Secure keypad is unlocked with secure display still intact in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9206, MDM9607, MDM9650, MDM9655, QCS605, SD 210/SD 212/SD 205, SD 410/12, SD 615/16/SD 415, SD 636, SD 712 / SD 710 / SD 670, SD 835, SD 845 / SD 850, SD 8CX, SDA660, SDM630, SDM660, SXR1130 2019-05-24 4.9 CVE-2018-12004
CONFIRM
readaxo — readaxo In Redaxo 5.2.0, the cron management of the admin panel suffers from CSRF that leads to arbitrary Remote Code Execution via addons/cronjob/lib/types/phpcode.php. 2019-05-24 6.8 CVE-2016-10757
MISC
MISC
revive-adserver — revive_adserver Use of cryptographically weak PRNG in the password recovery token generation of Revive Adserver < v4.2.1 causes a potential authentication bypass attack if an attacker exploits the password recovery functionality. In lib/OA/Dal/PasswordRecovery.php, the function generateRecoveryId() generates a password reset token that relies on the PHP uniqid function and consequently depends only on the current server time, which is often visible in an HTTP Date header. 2019-05-28 6.8 CVE-2019-5440
MISC
samsung — scx-824_firmware Samsung SCX-824 printers allow a reflected Cross-Site-Scripting (XSS) vulnerability that can be triggered by using the “print from file” feature, as demonstrated by the sws/swsAlert.sws?popupid=successMsg msg parameter. 2019-05-24 4.3 CVE-2019-12315
MISC
synacor — zimbra_collaboration_suite Synacor Zimbra Mail Client 8.6 before 8.6.0 Patch 5 has XSS via the error/warning dialog and email body content in Zimbra. 2019-05-30 4.3 CVE-2015-7609
MISC
MISC
MISC
MISC
MISC
synacor — zimbra_collaboration_suite Synacor Zimbra Collaboration Suite Collaboration before 8.8.11 has XSS in the AJAX and html web clients. 2019-05-29 4.3 CVE-2018-14013
MISC
MISC
MISC
MISC
MISC
MISC
MISC
synacor — zimbra_collaboration_suite There is a Persistent XSS vulnerability in the briefcase component of Synacor Zimbra Collaboration Suite (ZCS) Zimbra Web Client (ZWC) 8.8.8 before 8.8.8 Patch 7 and 8.8.9 before 8.8.9 Patch 1. 2019-05-30 4.3 CVE-2018-14425
MISC
MISC
synacor — zimbra_collaboration_suite An issue was discovered in Synacor Zimbra Collaboration Suite 8.6.x before 8.6.0 Patch 11, 8.7.x before 8.7.11 Patch 6, 8.8.x before 8.8.8 Patch 9, and 8.8.9 before 8.8.9 Patch 3. Account number enumeration is possible via inconsistent responses for specific types of authentication requests. 2019-05-30 5.0 CVE-2018-15131
MISC
MISC
synacor — zimbra_collaboration_suite mailboxd component in Synacor Zimbra Collaboration Suite 8.6, 8.7 before 8.7.11 Patch 7, and 8.8 before 8.8.10 Patch 2 has Persistent XSS. 2019-05-29 4.3 CVE-2018-18631
MISC
MISC
synacor — zimbra_collaboration_suite Zimbra Collaboration Suite 8.7.x through 8.8.11 allows Blind SSRF in the Feed component. 2019-05-29 4.0 CVE-2019-6981
MISC
MISC
tinycc — tinycc An issue was discovered in Tiny C Compiler (aka TinyCC or TCC) 0.9.27. Compiling a crafted source file leads to a one-byte out-of-bounds write in the gsym_addr function in x86_64-gen.c. This occurs because tccasm.c mishandles section switches. 2019-05-31 4.3 CVE-2019-12495
MISC
MISC
torproject — tor_browser Tor Browser before 8.0.1 has an information exposure vulnerability. It allows remote attackers to detect the browser’s UI locale by measuring a button width, even if the user has a “Don’t send my language” setting. 2019-05-27 4.3 CVE-2019-12383
BID
MISC
MISC
MISC
vtiger — vtiger_crm modules/Calendar/Activity.php in Vtiger CRM 6.5.0 allows SQL injection via the contactidlist parameter. 2019-05-24 6.5 CVE-2016-10754
MISC
MISC
webport — web_port Web Port 1.19.1 allows XSS via the /access/setup type parameter. 2019-05-30 4.3 CVE-2019-12460
MISC
MISC
webport — web_port Web Port 1.19.1 allows XSS via the /log type parameter. 2019-05-30 4.3 CVE-2019-12461
MISC
MISC
westermo — dr-250_firmware The /uploadfile? functionality in Westermo DR-250 Pre-5162 and DR-260 Pre-5162 routers allows remote users to upload malicious file types and execute ASP code. 2019-05-24 6.5 CVE-2018-19612
MISC
MISC
westermo — dr-250_firmware Westermo DR-250 Pre-5162 and DR-260 Pre-5162 routers allow CSRF. 2019-05-24 4.3 CVE-2018-19613
MISC
MISC
windriver — vxworks When RPC is enabled in Wind River VxWorks 6.9 prior to 6.9.1, a specially crafted RPC request can trigger an integer overflow leading to an out-of-bounds memory copy. It may allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code. 2019-05-29 6.8 CVE-2019-9865
MISC
CONFIRM
yealink — ultra-elegant_ip_phone_sip-t41p_firmware A CSRF (Cross Site Request Forgery) in the web interface of the Yeahlink Ultra-elegant IP Phone SIP-T41P firmware version 66.83.0.35 allows a remote attacker to trigger code execution or settings modification on the device by providing a crafted link to the victim. 2019-05-29 6.8 CVE-2018-16218
MISC
MISC
zohocorp — manageengine_adselfservice_plus In Zoho ManageEngine ADSelfService Plus 5.x through 5704, an authorization.do cross-site Scripting (XSS) vulnerability allows for an unauthenticated manipulation of the JavaScript code by injecting the HTTP form parameter adscsrf. An attacker can use this to capture a user’s AD self-service password reset and MFA token. 2019-05-24 4.3 CVE-2019-8346
MISC

Back to top

 

Low Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
gitlab — gitlab An issue was discovered in GitLab Community and Enterprise Edition before 11.6.10, 11.7.x before 11.7.6, and 11.8.x before 11.8.1. It has Incorrect Access Control (issue 3 of 5). 2019-05-29 2.1 CVE-2019-9221
MISC
MISC
iball — 300m_2-port_wireless-n_broadband_router_firmware iBall Baton iB-WRB302N20122017 devices have improper access control over the UART interface, allowing physical attackers to discover Wi-Fi credentials (plain text) and the web-console password (base64) via the debugging console. 2019-05-28 2.1 CVE-2018-20008
MISC
MISC
ibm — cognos_analytics IBM Cognos Analytics 11.0, 11.1.0, and 11.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158335. 2019-05-29 3.5 CVE-2019-4139
CONFIRM
BID
XF
ibm — jazz_reporting_service IBM Jazz Reporting Service 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158974. 2019-05-29 3.5 CVE-2019-4184
BID
XF
CONFIRM
jenkins — warnings_next_generation A cross-site scripting vulnerability in Jenkins Warnings NG Plugin 5.0.0 and earlier allowed attacker with Job/Configure permission to inject arbitrary JavaScript in build overview pages. 2019-05-31 3.5 CVE-2019-10325
MLIST
MISC
linux — linux_kernel An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. 2019-05-27 2.1 CVE-2019-12380
BID
MISC
synacor — zimbra_collaboration_suite Synacor Zimbra Admin UI in Zimbra Collaboration Suite before 8.8.0 beta 2 has Persistent XSS via mail addrs. 2019-05-30 3.5 CVE-2018-10948
MISC
tp-link — tl-wr840n_firmware TP-Link TL-WR840N v5 00000005 devices allow XSS via the network name. The attacker must log into the router by breaking the password and going to the admin login page by THC-HYDRA to get the network name. With an XSS payload, the network name changed automatically and the internet connection was disconnected. All the users become disconnected from the internet. 2019-05-24 3.5 CVE-2019-12195
MISC
MISC

Back to top

 

Severity Not Yet Assigned

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
advanced_infodata_systems — esel-server SQL Injection in Advanced InfoData Systems (AIS) ESEL-Server 67 (which is the backend for the AIS logistics mobile app) allows an anonymous attacker to execute arbitrary code in the context of the user of the MSSQL database. The default user for the database is the ‘sa’ user. 2019-05-31 not yet calculated CVE-2019-10123
MISC
MISC
apache — roller Server-side Request Forgery (SSRF) and File Enumeration vulnerability in Apache Roller 5.2.1, 5.2.0 and earlier unsupported versions relies on Java SAX Parser to implement its XML-RPC interface and by default that parser supports external entities in XML DOCTYPE, which opens Roller up to SSRF / File Enumeration vulnerability. Note that this vulnerability exists even if Roller XML-RPC interface is disable via the Roller web admin UI. Mitigation: There are a couple of ways you can fix this vulnerability: 1) Upgrade to the latest version of Roller, which is now 5.2.2 2) Or, edit the Roller web.xml file and comment out the XML-RPC Servlet mapping as shown below: <!– <servlet-mapping> <servlet-name>XmlRpcServlet</servlet-name> <url-pattern>/roller-services/xmlrpc</url-pattern> </servlet-mapping> –> 2019-05-28 not yet calculated CVE-2018-17198
BID
MISC
aveva — vijeo_citect_and_citectscada In Vijeo Citect 7.30 and 7.40, and CitectSCADA 7.30 and 7.40, a vulnerability has been identified that may allow an authenticated local user access to Citect user credentials. 2019-05-31 not yet calculated CVE-2019-10981
MISC
CONFIRM
bitdefender — bitdefender_engines An issue was discovered in Bitdefender Engines before 7.76675. A vulnerability has been discovered in the rar.xmd parser that results from a lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. Paired with other vulnerabilities, this can result in denial-of-service. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. 2019-05-24 not yet calculated CVE-2018-18059
MISC
MISC
bitdefender — bitdefender_engines An issue was discovered in Bitdefender Engines before 7.76808. A vulnerability has been discovered in the dalvik.xmd parser that results from a lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. Paired with other vulnerabilities, this can result in denial-of-service. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. 2019-05-24 not yet calculated CVE-2018-18060
MISC
MISC
bitdefender — bitdefender_engines
 
An issue was discovered in Bitdefender Engines before 7.76662. A vulnerability has been discovered in the iso.xmd parser that results from a lack of proper validation of user-supplied data, which can result in a division-by-zero circumstance. Paired with other vulnerabilities, this can result in denial-of-service. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. 2019-05-24 not yet calculated CVE-2018-18058
MISC
MISC
bosch — smart_home_controller A potential improper access control vulnerability exists in the JSON-RPC interface of the Bosch Smart Home Controller (SHC) before 9.8.905 that may result in reading or modification of the SHC’s configuration or triggering and restoring backups. In order to exploit the vulnerability, the adversary needs to have successfully paired an app or service, which requires user interaction. 2019-05-29 not yet calculated CVE-2019-11892
CONFIRM
bosch — smart_home_controller A potential incorrect privilege assignment vulnerability exists in the app pairing mechanism of the Bosch Smart Home Controller (SHC) before 9.8.905 that may result in elevated privileges of the adversary’s choosing. In order to exploit the vulnerability, the adversary needs physical access to the SHC during the attack. 2019-05-29 not yet calculated CVE-2019-11891
CONFIRM
bosch — smart_home_controller A potential incorrect privilege assignment vulnerability exists in the app permission update API of the Bosch Smart Home Controller (SHC) before 9.8.905 that may result in a restricted app obtaining default app permissions. In order to exploit the vulnerability, the adversary needs to have successfully paired an app with restricted permissions, which required user interaction. 2019-05-29 not yet calculated CVE-2019-11893
CONFIRM
bosch — smart_home_controller A potential improper access control vulnerability exists in the backup mechanism of the Bosch Smart Home Controller (SHC) before 9.8.905 that may result in unauthorized download of a backup. In order to exploit the vulnerability, the adversary needs to download the backup directly after a backup triggered by a legitimate user has been completed. 2019-05-29 not yet calculated CVE-2019-11894
CONFIRM
bosch — smart_home_controller A potential improper access control vulnerability exists in the JSON-RPC interface of the Bosch Smart Home Controller (SHC) before 9.8.905 that may result in a successful denial of service of the SHC and connected sensors and actuators. In order to exploit the vulnerability, the adversary needs to have successfully paired an app or service, which requires user interaction. 2019-05-29 not yet calculated CVE-2019-11895
CONFIRM
bosch — smart_home_controller A potential incorrect privilege assignment vulnerability exists in the 3rd party pairing mechanism of the Bosch Smart Home Controller (SHC) before 9.8.907 that may result in a restricted app obtaining default app permissions. In order to exploit the vulnerability, the adversary needs to have successfully paired an app, which requires user interaction. 2019-05-29 not yet calculated CVE-2019-11896
CONFIRM
containous — traefik types/types.go in Containous Traefik 1.7.x through 1.7.11, when the –api flag is used and the API is publicly reachable and exposed without sufficient access control (which is contrary to the API documentation), allows remote authenticated users to discover password hashes by reading the Basic HTTP Authentication or Digest HTTP Authentication section, or discover a key by reading the ClientTLS section. These can be found in the JSON response to a /api request. 2019-05-29 not yet calculated CVE-2019-12452
MISC
MISC
MISC
evernote — evernote Evernote 7.9 on macOS allows attackers to execute arbitrary programs by embedding a reference to a local executable file such as the /Applications/Calculator.app/Contents/MacOS/Calculator file. 2019-05-31 not yet calculated CVE-2019-10038
MISC
MISC
MISC
godot_engine — godot In Godot through 3.1, remote code execution is possible due to the deserialization policy not being applied correctly. 2019-05-31 not yet calculated CVE-2019-10069
MISC
MISC
google — sign-in An unhandled exception vulnerability exists during Google Sign-In with Google API C++ Client before 2019-04-10. It potentially causes an outage of third-party services that were not designed to recover from exceptions. On the client, ID token handling can cause an unhandled exception because of misinterpretation of an integer as a string, resulting in denial-of-service and then other users can no longer login/sign-in to the affected third-party service. Once this third-party service uses Google Sign-In with google-api-cpp-client, a malicious user can trigger this client/auth/oauth2_authorization.cc vulnerability by requesting the client to receive the ID token from a Google authentication server. 2019-05-30 not yet calculated CVE-2018-20840
MISC
MISC
hp — workstation_bios HP has identified a security vulnerability with some versions of Workstation BIOS (UEFI Firmware) where the runtime BIOS code could be tampered with if the TPM is disabled. This vulnerability relates to Workstations whose TPM is enabled by default. 2019-05-29 not yet calculated CVE-2019-6322
HP
hp — workstation_bios HP has identified a security vulnerability with some versions of Workstation BIOS (UEFI Firmware) where the runtime BIOS code could be tampered with if the TPM is disabled. This vulnerability relates to Workstations whose TPM is disabled by default. 2019-05-29 not yet calculated CVE-2019-6321
HP
ibm — spectrum_control IBM Tivoli Storage Productivity Center 5.2.13 through 5.3.0.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. X-Force ID: 158334. 2019-05-29 not yet calculated CVE-2019-4138
CONFIRM
BID
XF
ibm — spectrum_control IBM Tivoli Storage Productivity Center 5.2.13 through 5.3.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158333. 2019-05-29 not yet calculated CVE-2019-4137
CONFIRM
BID
XF
jector — smart_tv_fm-k75_devices Jector Smart TV FM-K75 devices allow remote code execution because there is an adb open port with root permission. 2019-05-31 not yet calculated CVE-2019-9871
MISC
MISC
logicaldoc — logicaldoc_community_edition LogicalDOC Community Edition 8.x before 8.2.1 has a path traversal vulnerability that allows reading arbitrary files and the creation of directories, in the class PluginRegistry. 2019-05-30 not yet calculated CVE-2019-9723
MISC
mitel — micollab_and_micollab_awv MiCollab 7.3 PR2 (7.3.0.204) and earlier, 7.2 (7.2.2.13) and earlier, and 7.1 (7.1.0.57) and earlier and MiCollab AWV 6.3 (6.3.0.103), 6.2 (6.2.2.8), 6.1 (6.1.0.28), 6.0 (6.0.0.61), and 5.0 (5.0.5.7) have a Command Execution Vulnerability. Successful exploit of this vulnerability could allow an attacker to execute arbitrary system commands. 2019-05-29 not yet calculated CVE-2019-12165
MISC
nuuo — network_video_recorder_firmware NUUO Network Video Recorder Firmware 1.7.x through 3.3.x allows unauthenticated attackers to execute arbitrary commands via shell metacharacters to handle_load_config.php. 2019-05-31 not yet calculated CVE-2019-9653
MISC
MISC
MISC
nvidia — geforce_experience NVIDIA GeForce Experience versions prior to 3.19 contains a vulnerability in the Web Helper component, in which an attacker with local system access can craft input that may not be properly validated. Such an attack may lead to code execution, denial of service or information disclosure. 2019-05-31 not yet calculated CVE-2019-5678
CONFIRM
petraware — ptransformer_adc Petraware pTransformer ADC before 2.1.7.22827 allows SQL Injection via the User ID parameter to the login form. 2019-05-27 not yet calculated CVE-2019-12372
MISC
MISC
project_atomic — bubblewrap bubblewrap.c in Bubblewrap before 0.3.3 misuses temporary directories in /tmp as a mount point. In some particular configurations (related to XDG_RUNTIME_DIR), a local attacker may abuse this flaw to prevent other users from executing bubblewrap or potentially execute code. 2019-05-29 not yet calculated CVE-2019-12439
MISC
MISC
MISC
MISC
pydio — pydio An unauthenticated attacker can obtain information about the Pydio 8.2.2 configuration including session timeout, libraries, and license information. 2019-05-31 not yet calculated CVE-2019-10046
MISC
pydio — pydio The “action” get_sess_id in the web application of Pydio through 8.2.2 discloses the session cookie value in the response body, enabling scripts to get access to its value. This identifier can be reused by an attacker to impersonate a user and perform actions on behalf of him/her (if the session is still active). 2019-05-31 not yet calculated CVE-2019-10045
MISC
pydio — pydio
 
It is possible for an attacker with regular user access to the web application of Pydio through 8.2.2 to trick an administrator user into opening a link shared through the application, that in turn opens a shared file that contains JavaScript code (that is executed in the context of the victim user to obtain sensitive information such as session identifiers and perform actions on behalf of him/her). 2019-05-31 not yet calculated CVE-2019-10049
MISC
pydio — pydio
 
A stored XSS vulnerability exists in the web application of Pydio through 8.2.2 that can be exploited by levering the file upload and file preview features of the application. An authenticated attacker can upload an HTML file containing JavaScript code and afterwards a file preview URL can be used to access the uploaded file. If a malicious user shares an uploaded HTML file containing JavaScript code with another user of the application, and tricks an authenticated victim into accessing a URL that results in the HTML code being interpreted by the web browser, then the included JavaScript code is executed under the context of the victim user session. 2019-05-31 not yet calculated CVE-2019-10047
MISC
pydio — pydio
 
The ImageMagick plugin that is installed by default in Pydio through 8.2.2 does not perform the appropriate validation and sanitization of user supplied input in the plugin’s configuration options, allowing arbitrary shell commands to be entered that result in command execution on the underlying operating system, with the privileges of the local user running the web server. The attacker must be authenticated into the application with an administrator user account in order to be able to edit the affected plugin configuration. 2019-05-31 not yet calculated CVE-2019-10048
MISC
qemu — qemu In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk. 2019-05-31 not yet calculated CVE-2018-20815
MISC
quest — kace_systems_management_appliance An issue was discovered in Quest KACE Systems Management Appliance before 9.1. The script at /service/kbot_service_notsoap.php is vulnerable to unauthenticated reflected XSS when user-supplied input to the METHOD GET parameter is processed by the web application. Since the application does not properly validate and sanitize this parameter, it is possible to place arbitrary script code into the context of the same page. 2019-05-24 not yet calculated CVE-2019-11604
MISC
FULLDISC
MISC
saet — impianti_speciali_tebe_small_devices The WebApp v04.68 in the supervisor on SAET Impianti Speciali TEBE Small 05.01 build 1137 devices allows remote attackers to execute or include local .php files, as demonstrated by menu=php://filter/convert.base64-encode/resource=index.php to read index.php. 2019-05-31 not yet calculated CVE-2019-9106
MISC
MISC
saet — impianti_speciali_tebe_small_devices The WebApp v04.68 in the supervisor on SAET Impianti Speciali TEBE Small 05.01 build 1137 devices allows remote attackers to make several types of API calls without authentication, as demonstrated by retrieving password hashes via an inc/utils/REST_API.php?command=CallAPI&customurl=alladminusers call. 2019-05-31 not yet calculated CVE-2019-9105
MISC
MISC
sitecore — sitecore Deserialization of Untrusted Data in the anti CSRF module in Sitecore through 9.1 allows an authenticated attacker to execute arbitrary code by sending a serialized .NET object in an HTTP POST parameter. 2019-05-31 not yet calculated CVE-2019-9875
MISC
MISC
MISC
sitecore — sitecore_cms_and_sitecore_xp Deserialization of Untrusted Data in the Sitecore.Security.AntiCSRF (aka anti CSRF) module in Sitecore CMS 7.0 to 7.2 and Sitecore XP 7.5 to 8.2 allows an unauthenticated attacker to execute arbitrary code by sending a serialized .NET object in the HTTP POST parameter __CSRFTOKEN. 2019-05-31 not yet calculated CVE-2019-9874
MISC
MISC
MISC
sitecore — sitecore_rocks The Sitecore Rocks plugin before 2.1.149 for Sitecore allows an unauthenticated threat actor to inject malicious commands and code via the Sitecore Rocks Hard Rocks Service. 2019-05-29 not yet calculated CVE-2019-12440
MISC
MISC
MISC
synacor — zimbra_collaboration_server Synacor Zimbra Collaboration Server 8.x before 8.7.0 has Reflected XSS in admin console. 2019-05-30 not yet calculated CVE-2015-2230
MISC
MISC
the_linux_documentation_project — advanced_bash_scripting_guide The function getopt_simple as described in Advanced Bash Scripting Guide (ISBN 978-1435752184) allows privilege escalation and execution of commands when used in a shell script called, for example, via sudo. 2019-05-31 not yet calculated CVE-2019-9891
MISC
xiaomi — m365_scooter The Xiaomi M365 scooter 2019-02-12 before 1.5.1 allows spoofing of “suddenly accelerate” commands. This occurs because Bluetooth Low Energy commands have no server-side authentication check. Other affected commands include suddenly braking, locking, and unlocking. 2019-05-31 not yet calculated CVE-2019-12500
MISC
xpdf — xpdf There is an out-of-bounds read vulnerability in the function FlateStream::getChar() located at Stream.cc in Xpdf 4.01.01. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It might allow an attacker to cause Information Disclosure or a denial of service. 2019-06-01 not yet calculated CVE-2019-12515
MISC
zyxel — p-660hn_t1_devices The rpWLANRedirect.asp ASP page is accessible without authentication on ZyXEL P-660HN-T1 V2 (2.00(AAKK.3)) devices. After accessing the page, the admin user’s password can be obtained by viewing the HTML source code, and the interface of the modem can be accessed as admin. 2019-05-31 not yet calculated CVE-2019-6725
BUGTRAQ

Back to top


This product is provided subject to this Notification and this Privacy & Use policy.

SB19-147: Vulnerability Summary for the Week of May 20, 2019

Original release date: May 27, 2019

The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.

The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High – Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 – 10.0

  • Medium – Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 – 6.9

  • Low – Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 – 3.9

Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.

The NCCIC Weekly Vulnerability Summary Bulletin is created using information from the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD). In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

 

High Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 10.0 CVE-2019-7027
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-23 10.0 CVE-2019-7088
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-23 9.3 CVE-2019-7111
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-23 10.0 CVE-2019-7112
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-23 10.0 CVE-2019-7113
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-23 10.0 CVE-2019-7117
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-23 10.0 CVE-2019-7118
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-23 10.0 CVE-2019-7119
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-23 10.0 CVE-2019-7120
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-23 10.0 CVE-2019-7124
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-23 9.3 CVE-2019-7125
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-23 10.0 CVE-2019-7128
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7759
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7760
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7761
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7762
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7763
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7764
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7765
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7766
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7767
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7768
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7772
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a security bypass vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7779
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7781
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7782
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7783
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a double free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7784
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7786
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7788
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7791
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7792
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7796
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7797
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7800
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-22 10.0 CVE-2019-7804
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7805
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7806
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7807
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7808
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 7.1 CVE-2019-7809
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7814
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7817
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7818
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7820
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 7.1 CVE-2019-7821
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7822
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 7.1 CVE-2019-7823
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a buffer error vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7824
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7825
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7827
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7828
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7829
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7830
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7831
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7832
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7833
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7834
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 10.0 CVE-2019-7835
BID
CONFIRM
adobe — bridge_cc Adobe Bridge CC versions 9.0.2 have a heap overflow vulnerability. Successful exploitation could lead to remote code execution. 2019-05-23 10.0 CVE-2019-7130
CONFIRM
adobe — bridge_cc Adobe Bridge CC versions 9.0.2 have an out-of-bounds write vulnerability. Successful exploitation could lead to remote code execution. 2019-05-23 9.3 CVE-2019-7132
CONFIRM
MISC
adobe — flash_player Adobe Flash Player versions 32.0.0.171 and earlier, 32.0.0.171 and earlier, and 32.0.0.171 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 9.3 CVE-2019-7837
BID
REDHAT
CONFIRM
MISC
adobe — indesign Adobe InDesign versions 14.0.1 and below have an unsafe hyperlink processing vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-23 10.0 CVE-2019-7107
CONFIRM
adobe — shockwave_player Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-23 10.0 CVE-2019-7104
CONFIRM
adobe — xd Adobe XD versions 16.0 and earlier have a path traversal vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-23 10.0 CVE-2019-7105
CONFIRM
adobe — xd Adobe XD versions 16.0 and earlier have a path traversal vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-23 10.0 CVE-2019-7106
CONFIRM
atutor — atutor ATutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/backups/upload.php (aka backup) component. This may result in remote command execution. An attacker can use the instructor account to fully compromise the system using a crafted backup ZIP archive. This will allow for PHP files to be written to the web root, and for code to execute on the remote server. 2019-05-17 9.0 CVE-2019-12170
MISC
MISC
blogifier — blogifier Blogifier 2.3 before 2019-05-11 does not properly restrict APIs, as demonstrated by missing checks for .. in a pathname. 2019-05-22 7.5 CVE-2019-12277
MISC
bmc — patrol_agent By default, BMC PATROL Agent through 11.3.01 uses a static encryption key for encrypting/decrypting user credentials sent over the network to managed PATROL Agent services. If an attacker were able to capture this network traffic, they could decrypt these credentials and use them to execute code or escalate privileges on the network. 2019-05-20 7.5 CVE-2019-8352
MISC
carts.guru — carts_guru The Carts Guru plugin 1.4.5 for WordPress allows Insecure Deserialization via a cartsguru-source cookie to classes/wc-cartsguru-event-handler.php. 2019-05-20 7.5 CVE-2019-12241
MISC
citrix — receiver Citrix Workspace App before 1904 for Windows has Incorrect Access Control. 2019-05-22 7.5 CVE-2019-11634
CONFIRM
MISC
computrols — computrols_building_automation_software Computrols CBAS 18.0.0 has Default Credentials. 2019-05-23 10.0 CVE-2019-10850
MISC
MISC
computrols — computrols_building_automation_software Computrols CBAS 18.0.0 allows Authenticated Command Injection. 2019-05-23 9.0 CVE-2019-10854
MISC
MISC
elabftw — elabftw eLabFTW 1.8.5 is vulnerable to arbitrary file uploads via the /app/controllers/EntityController.php component. This may result in remote command execution. An attacker can use a user account to fully compromise the system using a POST request. This will allow for PHP files to be written to the web root, and for code to execute on the remote server. 2019-05-19 9.0 CVE-2019-12185
MISC
MISC
exponentcms — exponent_cms Exponent CMS version 2.3.9 suffers from a sql injection vulnerability in framework/modules/help/controllers/helpController.php. 2019-05-23 7.5 CVE-2016-8897
MISC
MISC
exponentcms — exponent_cms Exponent CMS version 2.3.9 suffers from a Object Injection vulnerability in framework/modules/core/controllers/expCatController.php related to change_cats. 2019-05-23 7.5 CVE-2016-8899
MISC
MISC
falco — falco An issue was discovered in Falco through 0.14.0. A missing indicator for insufficient resources allows local users to bypass the detection engine. 2019-05-17 7.2 CVE-2019-8339
CONFIRM
CONFIRM
CONFIRM
MISC
four-faith — f3x24_firmware Four-Faith Wireless Mobile Router F3x24 v1.0 devices allow remote code execution via the Command Shell (aka Administration > Commands) screen. 2019-05-17 9.0 CVE-2019-12168
MISC
fujitsu — paperstream_ip_(twain) In PaperStream IP (TWAIN) 1.42.0.5685 (Service Update 7), the FJTWSVIC service running with SYSTEM privilege processes unauthenticated messages received over the FjtwMkic_Fjicube_32 named pipe. One of these message processing functions attempts to dynamically load the UninOldIS.dll library and executes an exported function named ChangeUninstallString. The default install does not contain this library and therefore if any DLL with that name exists in any directory listed in the PATH variable, it can be used to escalate to SYSTEM level privilege. 2019-05-17 7.2 CVE-2018-16156
MISC
gnu — wget Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors. 2019-05-17 7.5 CVE-2019-5953
MISC
MISC
gohttp_project — gohttp GoHTTP through 2017-07-25 has a GetExtension heap-based buffer overflow via a long extension. 2019-05-17 7.5 CVE-2019-12158
MISC
gohttp_project — gohttp GoHTTP through 2017-07-25 has a sendHeader use-after-free. 2019-05-17 7.5 CVE-2019-12160
MISC
ibm — websphere_application_server IBM WebSphere Application Server 8.5 and 9.0 could allow a remote attacker to execute arbitrary code on the system with a specially-crafted sequence of serialized objects from untrusted sources. IBM X-Force ID: 160445. 2019-05-17 10.0 CVE-2019-4279
BID
XF
CONFIRM
ibm — websphere_mq IBM WebSphere MQ 8.0.0.0 through 8.0.0.9 and 9.0.0.0 through 9.1.1 could allow a local non privileged user to execute code as an administrator due to incorrect permissions set on MQ installation directories. IBM X-Force ID: 157190. 2019-05-23 7.2 CVE-2019-4078
XF
CONFIRM
intel — converged_security_management_engine_firmware Logic bug vulnerability in subsystem for Intel(R) CSME before version 12.0.35, Intel(R) TXE before 3.1.65, 4.0.15 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. 2019-05-17 7.2 CVE-2019-0098
MISC
intel — converged_security_management_engine_firmware Buffer overflow in subsystem in Intel(R) CSME before version 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via network access. 2019-05-17 7.5 CVE-2019-0153
MISC
intel — hns2400lp_firmware Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. 2019-05-17 7.2 CVE-2019-0119
MISC
intel — unite A logic issue in Intel Unite(R) Client for Android prior to version 4.0 may allow a remote attacker to potentially enable escalation of privilege via network access. 2019-05-17 7.5 CVE-2019-0172
MISC
intel — xeon_bronze_processors_firmware Insufficient access control in silicon reference firmware for Intel(R) Xeon(R) Scalable Processor, Intel(R) Xeon(R) Processor D Family may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. 2019-05-17 7.2 CVE-2019-0126
MISC
kalkitech — sync3000_firmware Kalki Kalkitech SYNC3000 Substation DCU GPC v2.22.6, 2.23.0, 2.24.0, 3.0.0, 3.1.0, 3.1.16, 3.2.3, 3.2.6, 3.5.0, 3.6.0, and 3.6.1, when WebHMI is not installed, allows an attacker to inject client-side commands or scripts to be executed on the device with privileged access, aka CYB/2019/19561. The attack requires network connectivity to the device and exploits the webserver interface, typically through a browser. 2019-05-22 10.0 CVE-2019-11536
MISC
MISC
lemonldap-ng — lemonldap:: LemonLDAP::NG -2.0.3 has Incorrect Access Control. 2019-05-22 7.5 CVE-2019-12046
MISC
MISC
MISC
MISC
MISC
CONFIRM
CONFIRM
MISC
motorola — cx2_firmware An issue was discovered in scopd on Motorola routers CX2 1.01 and M2 1.01. There is a Use of an Externally Controlled Format String, reachable via TCP port 8010 or UDP port 8080. 2019-05-23 7.5 CVE-2019-12297
MISC
nagios — nagios_xi Nagios XI 5.6.1 allows SQL injection via the username parameter to login.php?forgotpass (aka the reset password form). 2019-05-22 7.5 CVE-2019-12279
MISC
BID
MISC
nginx — njs njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in nxt_utf8_encode in nxt_utf8.c. 2019-05-20 7.5 CVE-2019-12206
MISC
nginx — njs njs through 0.3.1, used in NGINX, has a heap-based buffer over-read in nxt_utf8_decode in nxt/nxt_utf8.c. 2019-05-20 7.5 CVE-2019-12207
MISC
nginx — njs njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in njs_function_native_call in njs/njs_function.c. 2019-05-20 7.5 CVE-2019-12208
MISC
open-emr — openemr An issue was discovered in OpenEMR before 5.0.1 Patch 7. There is SQL Injection in the make_task function in /interface/forms/eye_mag/php/taskman_functions.php via /interface/forms/eye_mag/taskman.php. 2019-05-17 7.5 CVE-2018-17179
MISC
MISC
open-emr — openemr An issue was discovered in OpenEMR before 5.0.1 Patch 7. SQL Injection exists in the SaveAudit function in /portal/lib/paylib.php and the portalAudit function in /portal/lib/appsql.class.php. 2019-05-17 7.5 CVE-2018-17181
MISC
MISC
open-xchange — open-xchange_appsuite OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: Insecure Permissions. 2019-05-23 7.5 CVE-2017-17060
MISC
CONFIRM
open-xchange — open-xchange_appsuite Open-Xchange GmbH OX App Suite 7.8.3 is affected by: Incorrect Access Control. 2019-05-23 7.5 CVE-2017-5212
MISC
MISC
CONFIRM
open-xchange — open-xchange_appsuite Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Incorrect Access Control. 2019-05-22 7.5 CVE-2017-5863
MISC
MISC
CONFIRM
openwrt — luci In OpenWrt LuCI through 0.10, the endpoints admin/status/realtime/bandwidth_status and admin/status/realtime/wireless_status of the web application are affected by a command injection vulnerability. 2019-05-23 7.5 CVE-2019-12272
MISC
MISC
percona — percona_server The Percona Server 5.6.44-85.0-1 packages for Debian and Ubuntu suffered an issue where the server would reset the root password to a blank value upon an upgrade. This was fixed in 5.6.44-85.0-2. 2019-05-23 10.0 CVE-2019-12301
MISC
MISC
schneider-electric — modicon_m340_firmware A CWE-290: Authentication Bypass by Spoofing vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause an elevation of privilege by conducting a brute force attack on Modbus parameters sent to the controller. 2019-05-22 7.5 CVE-2018-7842
MISC
schneider-electric — modicon_m340_firmware A CWE-284: Improper Access Control vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause denial of service or potential code execution by overwriting configuration settings of the controller over Modbus. 2019-05-22 7.5 CVE-2018-7847
MISC
schneider-electric — modicon_premium_firmware A CWE-284: Improper Access Control vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause a remote code execution by overwriting configuration settings of the controller over Modbus. 2019-05-22 7.5 CVE-2019-6808
MISC
schneider-electric — u.motion_builder A SQL Injection (CWE-89) vulnerability exists in U.motion Builder software version 1.3.4 which could cause unwanted code execution when an improper set of characters is entered. 2019-05-22 7.5 CVE-2018-7841
MISC
FULLDISC
CONFIRM
sensiolabs — symfony Certain Symfony products are affected by: Incorrect Access Control. This affects Symfony 2.7.30 and Symfony 2.8.23 and Symfony 3.2.10 and Symfony 3.3.3. The type of exploitation is: remote. The component is: Password validator. 2019-05-23 7.5 CVE-2017-11365
MISC
MISC
simplybook — simplybook SimplyBook.me through 2019-05-11 does not properly restrict File Upload which could allow remote code execution. 2019-05-17 7.5 CVE-2019-11887
CONFIRM
virim_project — virim The Virim plugin 0.4 for WordPress allows Insecure Deserialization via s_values, t_values, or c_values in graph.php. 2019-05-20 7.5 CVE-2019-12240
MISC
wolfssl — wolfssl wolfSSL 4.0.0 has a Buffer Overflow in DoPreSharedKeys in tls13.c when a current identity size is greater than a client identity size. An attacker sends a crafted hello client packet over the network to a TLSv1.3 wolfSSL server. The length fields of the packet: record length, client hello length, total extensions length, PSK extension length, total identity length, and identity length contain their maximum value which is 2^16. The identity data field of the PSK extension of the packet contains the attack data, to be stored in the undefined memory (RAM) of the server. The size of the data is about 65 kB. Possibly the attacker can perform a remote code execution attack. 2019-05-23 7.5 CVE-2019-11873
MISC
MISC

Back to top

 

Medium Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . 2019-05-23 5.0 CVE-2019-7061
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . 2019-05-23 4.3 CVE-2019-7109
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . 2019-05-23 4.3 CVE-2019-7110
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . 2019-05-23 5.0 CVE-2019-7114
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . 2019-05-23 5.0 CVE-2019-7115
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . 2019-05-23 5.0 CVE-2019-7116
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . 2019-05-23 5.0 CVE-2019-7121
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . 2019-05-23 5.0 CVE-2019-7122
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . 2019-05-23 5.0 CVE-2019-7123
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . 2019-05-23 4.3 CVE-2019-7127
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . 2019-05-22 4.3 CVE-2019-7140
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . 2019-05-22 4.3 CVE-2019-7141
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . 2019-05-22 5.0 CVE-2019-7142
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . 2019-05-22 6.8 CVE-2019-7143
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . 2019-05-22 4.3 CVE-2019-7144
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 4.3 CVE-2019-7145
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . 2019-05-22 4.3 CVE-2019-7758
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . 2019-05-22 5.0 CVE-2019-7769
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 5.0 CVE-2019-7770
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 5.0 CVE-2019-7771
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 5.0 CVE-2019-7773
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 5.0 CVE-2019-7774
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 5.0 CVE-2019-7775
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 5.0 CVE-2019-7776
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 5.0 CVE-2019-7777
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 5.0 CVE-2019-7778
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . 2019-05-22 5.0 CVE-2019-7780
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. 2019-05-22 4.3 CVE-2019-7785
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 4.3 CVE-2019-7787
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 5.0 CVE-2019-7789
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 5.0 CVE-2019-7790
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 5.0 CVE-2019-7793
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 4.3 CVE-2019-7794
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 5.0 CVE-2019-7795
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 6.8 CVE-2019-7798
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 4.3 CVE-2019-7799
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 4.3 CVE-2019-7801
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 4.3 CVE-2019-7802
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 4.3 CVE-2019-7803
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . 2019-05-22 4.3 CVE-2019-7810
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 5.0 CVE-2019-7811
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 5.0 CVE-2019-7812
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 5.0 CVE-2019-7813
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 6.8 CVE-2019-7826
BID
CONFIRM
MISC
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 5.0 CVE-2019-7836
BID
CONFIRM
adobe — acrobat Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 5.0 CVE-2019-7841
BID
CONFIRM
adobe — bridge_cc Adobe Bridge CC versions 9.0.2 have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-23 4.3 CVE-2019-7133
CONFIRM
adobe — bridge_cc Adobe Bridge CC versions 9.0.2 have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-23 4.3 CVE-2019-7134
CONFIRM
MISC
adobe — bridge_cc Adobe Bridge CC versions 9.0.2 have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-23 4.3 CVE-2019-7135
CONFIRM
MISC
adobe — bridge_cc Adobe Bridge CC versions 9.0.2 have an use after free vulnerability. Successful exploitation could lead to information disclosure. 2019-05-23 4.3 CVE-2019-7136
CONFIRM
MISC
adobe — bridge_cc Adobe Bridge CC versions 9.0.2 have a memory corruption vulnerability. Successful exploitation could lead to information disclosure. 2019-05-23 4.3 CVE-2019-7137
CONFIRM
MISC
adobe — bridge_cc Adobe Bridge CC versions 9.0.2 have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-23 4.3 CVE-2019-7138
CONFIRM
MISC
adobe — dreamweaver Adobe Dreamweaver versions 19.0 and earlier have an insecure protocol implementation vulnerability. Successful exploitation could lead to sensitive data disclosure if smb request is subject to a relay attack. 2019-05-23 5.0 CVE-2019-7097
CONFIRM
adobe — media_encoder Adobe Media Encoder version 13.0.2 has a use-after-free vulnerability. Successful exploitation could lead to remote code execution. 2019-05-22 6.8 CVE-2019-7842
BID
CONFIRM
MISC
adobe — media_encoder Adobe Media Encoder version 13.0.2 has an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-22 4.3 CVE-2019-7844
BID
CONFIRM
MISC
apache — jspwiki A carefully crafted malicious attachment could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. 2019-05-20 4.3 CVE-2019-10076
MLIST
BID
CONFIRM
MLIST
apache — jspwiki A carefully crafted InterWiki link could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. 2019-05-20 4.3 CVE-2019-10077
MLIST
BID
CONFIRM
MLIST
apache — jspwiki A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. Initial reporting indicated ReferredPagesPlugin, but further analysis showed that multiple plugins were vulnerable. 2019-05-20 4.3 CVE-2019-10078
MLIST
BID
CONFIRM
MLIST
MLIST
MLIST
apache — zookeeper An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper?s getACL() command doesn?t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users. 2019-05-23 4.3 CVE-2019-0201
BID
MISC
MLIST
CONFIRM
artifex — ghostscript Artifex Ghostscript 9.22 is affected by: Obtain Information. The impact is: obtain sensitive information. The component is: affected source code file, affected function, affected executable, affected libga (imagemagick used that). The attack vector is: Someone must open a postscript file though ghostscript. Because of imagemagick also use libga, so it was affected as well. 2019-05-23 4.3 CVE-2017-15652
CONFIRM
BID
MISC
atlassian — jira The ManageFilters.jspa resource in Jira before version 7.13.3 and from version 8.0.0 before version 8.1.1 allows remote attackers to enumerate usernames via an incorrect authorisation check. 2019-05-22 5.0 CVE-2019-3401
MISC
atlassian — jira The ConfigurePortalPages.jspa resource in Jira before version 7.13.3 and from version 8.0.0 before version 8.1.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the searchOwnerUserName parameter. 2019-05-22 4.3 CVE-2019-3402
MISC
atlassian — jira The /rest/api/2/user/picker rest resource in Jira before version 7.13.3, from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to enumerate usernames via an incorrect authorisation check. 2019-05-22 5.0 CVE-2019-3403
MISC
atlassian — jira The CachingResourceDownloadRewriteRule class in Jira before version 7.13.4, and from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to access files in the Jira webroot under the META-INF directory via a lax path access check. 2019-05-22 5.0 CVE-2019-8442
BID
MISC
atlassian — jira The ViewUpgrades resource in Jira before version 7.13.4, from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers who have obtained access to administrator’s session to access the ViewUpgrades administrative resource without needing to re-authenticate to pass “WebSudo” through an improper access control vulnerability. 2019-05-22 6.8 CVE-2019-8443
BID
MISC
buildbot — buildbot Buildbot before 1.8.2 and 2.x before 2.3.1 accepts a user-submitted authorization token from OAuth and uses it to authenticate a user. If an attacker has a token allowing them to read the user details of a victim, they can login as the victim. 2019-05-23 5.0 CVE-2019-12300
MISC
citrix — netscaler_application_delivery_controller_firmware A Buffer Overflow exists in Citrix NetScaler Gateway 10.5.x before 10.5.70.x, 11.1.x before 11.1.59.10, 12.0.x before 12.0.59.8, and 12.1.x before 12.1.49.23 and Citrix Application Delivery Controller 10.5.x before 10.5.70.x, 11.1.x before 11.1.59.10, 12.0.x before 12.0.59.8, and 12.1.x before 12.1.49.23. 2019-05-22 5.0 CVE-2019-12044
CONFIRM
MISC
commsy — commsy CommSy through 8.6.5 has SQL Injection via the cid parameter. This is fixed in 9.2. 2019-05-22 5.0 CVE-2019-11880
MISC
MISC
computrols — computrols_building_automation_software Computrols CBAS 18.0.0 allows Unauthenticated Reflected Cross-Site Scripting vulnerabilities in the login page and password reset page via the username GET parameter. 2019-05-23 4.3 CVE-2019-10846
MISC
MISC
computrols — computrols_building_automation_software Computrols CBAS 18.0.0 allows unprotected Subversion (SVN) directory / source code disclosure. 2019-05-23 5.0 CVE-2019-10849
MISC
MISC
computrols — computrols_building_automation_software Computrols CBAS 18.0.0 has hard-coded encryption keys. 2019-05-23 4.0 CVE-2019-10851
MISC
MISC
computrols — computrols_building_automation_software Computrols CBAS 18.0.0 allows Authenticated Blind SQL Injection via the id GET parameter, as demonstrated by the index.php?m=servers&a=start_pulling&id= substring. 2019-05-23 6.5 CVE-2019-10852
MISC
MISC
computrols — computrols_building_automation_software Computrols CBAS 18.0.0 mishandles password hashes. The approach is MD5 with a pw prefix, e.g., if the password is admin, it will calculate the MD5 hash of pwadmin and store it in a MySQL database. 2019-05-23 5.0 CVE-2019-10855
MISC
MISC
create-sd — create_sd CREATE SD official App for Android version 1.0.2 and earlier allows remote attackers to bypass access restriction to lead a user to access an arbitrary website via vulnerable application and conduct phishing attacks. 2019-05-17 5.8 CVE-2019-5955
MISC
MISC
cybozu — garoon Cybozu Garoon 4.0.0 to 4.6.3 allows remote attackers to bypass access restriction to browse unauthorized pages via the application ‘Management of Basic System’. 2019-05-17 4.0 CVE-2019-5930
MISC
MISC
cybozu — garoon Cybozu Garoon 4.0.0 to 4.6.3 allows authenticated attackers to alter the information with privileges invoking the installer via unspecified vectors. 2019-05-17 5.5 CVE-2019-5931
MISC
MISC
cybozu — garoon Cybozu Garoon 4.0.0 to 4.10.0 allows remote authenticated attackers to bypass access restriction to view the Bulletin Board without view privileges via the application ‘Bulletin’. 2019-05-17 4.0 CVE-2019-5933
MISC
MISC
cybozu — garoon SQL injection vulnerability in the Cybozu Garoon 4.0.0 to 4.10.0 allows attacker with administrator rights to execute arbitrary SQL commands via the Log Search function of application ‘logging’. 2019-05-17 6.5 CVE-2019-5934
MISC
MISC
cybozu — garoon Cybozu Garoon 4.0.0 to 4.10.1 allows remote authenticated attackers to bypass access restriction to change user information without access privileges via the Item function of User Information. 2019-05-17 4.0 CVE-2019-5935
MISC
MISC
cybozu — garoon Directory traversal vulnerability in Cybozu Garoon 4.0.0 to 4.10.1 allows remote authenticated attackers to obtain files without access privileges via the application ‘Work Flow’. 2019-05-17 5.5 CVE-2019-5936
MISC
MISC
cybozu — garoon Cybozu Garoon 4.0.0 to 4.10.1 allows remote authenticated attackers to bypass access restriction alter the Report without access privileges via the application ‘Multi Report’. 2019-05-17 4.0 CVE-2019-5941
MISC
MISC
cybozu — garoon Cybozu Garoon 4.0.0 to 4.10.1 allows remote authenticated attackers to bypass access restriction to obtain files without access privileges via the Multiple Files Download function of application ‘Cabinet’. 2019-05-17 4.0 CVE-2019-5942
MISC
MISC
cybozu — garoon Cybozu Garoon 4.0.0 to 4.10.1 allows remote authenticated attackers to bypass access restriction to view the information without view privileges via the application ‘Bulletin’ and the application ‘Cabinet’. 2019-05-17 4.0 CVE-2019-5943
MISC
MISC
cybozu — garoon Cybozu Garoon 4.0.0 to 4.10.1 allows remote authenticated attackers to bypass access restriction alter the contents of application ‘Address’ without modify privileges via the application ‘Address’. 2019-05-17 4.0 CVE-2019-5944
MISC
MISC
cybozu — garoon Cybozu Garoon 4.2.4 to 4.10.1 allow remote attackers to obtain the users’ credential information via the authentication of Cybozu Garoon. 2019-05-17 5.0 CVE-2019-5945
MISC
MISC
cybozu — garoon Open redirect vulnerability in Cybozu Garoon 4.2.4 to 4.10.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the Login Screen. 2019-05-17 5.8 CVE-2019-5946
MISC
MISC
digium — asterisk asterisk 13.10.0 is affected by: denial of service issues in asterisk. The impact is: cause a denial of service (remote). 2019-05-23 5.0 CVE-2016-7550
MISC
dotcms — dotcms dotCMS before 5.1.0 has a path traversal vulnerability exploitable by an administrator to create files. The vulnerability is caused by the insecure extraction of a ZIP archive. 2019-05-23 4.0 CVE-2019-12309
MISC
MISC
eaton — halo_home The Android mobile application Halo Home before 1.11.0 stores OAuth authentication and refresh access tokens in a clear text file. This file persists until the user logs out of the application and reboots the device. This vulnerability can allow an attacker to impersonate the legitimate user by reusing the stored OAuth token, thus allowing them to view and change the user’s personal information stored in the backend cloud service. The attacker would first need to gain physical control of the Android device or compromise it with a malicious app. 2019-05-22 4.3 CVE-2019-5625
MISC
MISC
emerson — liebert_challenger_firmware httpGetSet/httpGet.htm on Emerson Network Power Liebert Challenger 5.1E0.5 devices allows XSS via the statusstr parameter. 2019-05-22 4.3 CVE-2019-12167
BID
MISC
MISC
enigmail — enigmail Enigmail before 2.0.11 allows PGP signature spoofing: for an inline PGP message, an attacker can cause the product to display a “correctly signed” message indication, but display different unauthenticated text. 2019-05-21 5.0 CVE-2019-12269
MISC
MISC
f-secure — psb_workstation_security In the F-Secure installer in F-Secure SAFE for Windows before 17.6, F-Secure Internet Security before 17.6, F-Secure Anti-Virus before 17.6, F-Secure Client Security Standard and Premium before 14.10, F-Secure PSB Workstation Security before 12.01, and F-Secure Computer Protection Standard and Premium before 19.3, a local user can escalate their privileges through a DLL hijacking attack against the installer. The installer writes the file rm.exe to C:\Windows\Temp and then executes it. The rm.exe process then attempts to load several DLLs from its current directory. Non-admin users are able to write to this folder, so an attacker can create a malicious C:\Windows\Temp\OLEACC.dll file. When an admin runs the installer, rm.exe will execute the attacker’s DLL in an elevated security context. 2019-05-17 6.8 CVE-2019-11644
CONFIRM
fasterxml — jackson-databind A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation. 2019-05-17 5.0 CVE-2019-12086
MISC
MISC
CONFIRM
MLIST
MLIST
MISC
DEBIAN
freedesktop — poppler In Poppler through 0.76.1, there is a heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc via data with inconsistent heights or widths. 2019-05-23 6.8 CVE-2019-12293
BID
MISC
freedesktop — systemd systemd 242 changes the VT1 mode upon a logout, which allows attackers to read cleartext passwords in certain circumstances, such as watching a shutdown, or using Ctrl-Alt-F1 and Ctrl-Alt-F2. This occurs because the KDGKBMODE (aka current keyboard mode) check is mishandled. 2019-05-17 5.0 CVE-2018-20839
BID
MISC
MISC
MISC
freeimage_project — freeimage When FreeImage 3.18.0 reads a tiff file, it will be handed to the Load function of the PluginTIFF.cpp file, but a memcpy occurs in which the destination address and the size of the copied data are not considered, resulting in a heap overflow. 2019-05-20 5.0 CVE-2019-12211
MISC
freeimage_project — freeimage When FreeImage 3.18.0 reads a special JXR file, the StreamCalcIFDSize function of JXRMeta.c repeatedly calls itself due to improper processing of the file, eventually causing stack exhaustion. An attacker can achieve a remote denial of service attack by sending a specially constructed file. 2019-05-20 5.0 CVE-2019-12212
MISC
freeimage_project — freeimage When FreeImage 3.18.0 reads a special TIFF file, the TIFFReadDirectory function in PluginTIFF.cpp always returns 1, leading to stack exhaustion. 2019-05-20 4.3 CVE-2019-12213
MISC
freeimage_project — freeimage In FreeImage 3.18.0, an out-of-bounds access occurs because of mishandling of the OpenJPEG j2k_read_ppm_v3 function in j2k.c. The value of l_N_ppm comes from the file read in, and the code does not consider that l_N_ppm may be greater than the size of p_header_data. 2019-05-20 5.0 CVE-2019-12214
MISC
gatship — web_module GAT-Ship Web Module through 1.30 allows remote attackers to obtain potentially sensitive information via {} in a ws/gatshipWs.asmx/SqlVersion request. 2019-05-17 5.0 CVE-2019-12163
MISC
FULLDISC
MISC
get-simple — getsimple_cms An issue was discovered in GetSimple CMS through 3.3.15. insufficient input sanitation in the theme-edit.php file allows upload of files with arbitrary content (PHP code, for example). This vulnerability is triggered by an authenticated user; however, authentication can be bypassed. According to the official documentation for installation step 10, an admin is required to upload all the files, including the .htaccess files, and run a health check. However, what is overlooked is that the Apache HTTP Server by default no longer enables the AllowOverride directive, leading to data/users/admin.xml password exposure. The passwords are hashed but this can be bypassed by starting with the data/other/authorization.xml API key. This allows one to target the session state, since they decided to roll their own implementation. The cookie_name is crafted information that can be leaked from the frontend (site name and version). If a someone leaks the API key and the admin username, then they can bypass authentication. To do so, they need to supply a cookie based on an SHA-1 computation of this known information. The vulnerability exists in the admin/theme-edit.php file. This file checks for forms submissions via POST requests, and for the csrf nonce. If the nonce sent is correct, then the file provided by the user is uploaded. There is a path traversal allowing write access outside the jailed themes directory root. Exploiting the traversal is not necessary because the .htaccess file is ignored. A contributing factor is that there isn’t another check on the extension before saving the file, with the assumption that the parameter content is safe. This allows the creation of web accessible and executable files with arbitrary content. 2019-05-22 5.0 CVE-2019-11231
MISC
MISC
gitlab — gitlab GitLab CE/EE versions 8.18 up to 11.x before 11.3.11, 11.4.x before 11.4.8, and 11.5.x before 11.5.1 have CRLF Injection in Project Mirroring when using the Git protocol. 2019-05-17 5.0 CVE-2018-19585
MISC
MISC
gitlab — gitlab An insecure permissions issue was discovered in GitLab Community and Enterprise Edition 9.4 and later but before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. The runner registration token in the CI/CD settings could not be reset. This was a security risk if one of the maintainers leaves the group and they know the token. 2019-05-17 5.0 CVE-2018-20500
MISC
MISC
gitlab — gitlab An Incorrect Access Control issue was discovered in GitLab Community and Enterprise Edition 6.0 and later but before 11.3.11, 11.4.x before 11.4.8, and 11.5.x before 11.5.1. The issue comments feature could allow a user to comment on an issue which they shouldn’t be allowed to. 2019-05-17 6.4 CVE-2019-5883
MISC
gitlab — gitlab An Improper Input Validation issue was discovered in GitLab Community and Enterprise Edition before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. It was possible to use the profile name to inject a potentially malicious link into notification emails. 2019-05-17 5.0 CVE-2019-6781
MISC
MISC
gitlab — gitlab An Incorrect Access Control issue was discovered in GitLab Community and Enterprise Edition before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. The GitLab API allowed project Maintainers and Owners to view the trigger tokens of other project users. 2019-05-17 4.0 CVE-2019-6787
MISC
MISC
gitlab — gitlab An Incorrect Access Control (issue 2 of 3) issue was discovered in GitLab Community and Enterprise Edition 8.14 and later but before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. Guest users were able to view the list of a group’s merge requests. 2019-05-17 4.0 CVE-2019-6790
MISC
MISC
gitlab — gitlab An information disclosure issue was discovered in GitLab Enterprise Edition before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. The GitHub token used in CI/CD for External Repos was being leaked to project maintainers in the UI. 2019-05-17 5.0 CVE-2019-6797
MISC
MISC
gitlab — gitlab An Incorrect Access Control issue was discovered in GitLab Community and Enterprise Edition 11.7.x before 11.7.4. GitLab Releases were vulnerable to an authorization issue that allowed users to view confidential issue and merge request titles of other projects. 2019-05-17 6.4 CVE-2019-7353
MISC
MISC
gnu — gcc stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against. 2019-05-22 6.8 CVE-2018-12886
CONFIRM
MISC
gohttp_project — gohttp GoHTTP through 2017-07-25 has a stack-based buffer over-read in the scan function (when called from getRequestType) via a long URL. 2019-05-17 5.0 CVE-2019-12159
MISC
gohttp_project — gohttp In GoHttp through 2017-07-25, there is a stack-based buffer over-read via a long User-Agent header. 2019-05-20 5.0 CVE-2019-12198
MISC
golang — crypto A message-forgery issue was discovered in crypto/openpgp/clearsign/clearsign.go in supplementary Go cryptography libraries 2019-03-25. According to the OpenPGP Message Format specification in RFC 4880 chapter 7, a cleartext signed message can contain one or more optional “Hash” Armor Headers. The “Hash” Armor Header specifies the message digest algorithm(s) used for the signature. However, the Go clearsign package ignores the value of this header, which allows an attacker to spoof it. Consequently, an attacker can lead a victim to believe the signature was generated using a different message digest algorithm than what was actually used. Moreover, since the library skips Armor Header parsing in general, an attacker can not only embed arbitrary Armor Headers, but also prepend arbitrary text to cleartext messages without invalidating the signatures. 2019-05-22 4.3 CVE-2019-11841
MISC
MISC
MISC
MISC
google — chrome Incorrect inheritance of a new document’s policy in Content Security Policy in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page. 2019-05-23 4.3 CVE-2019-5799
MISC
MISC
google — chrome Insufficient policy enforcement in Blink in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page. 2019-05-23 4.3 CVE-2019-5800
MISC
MISC
google — chrome Incorrect eliding of URLs in Omnibox in Google Chrome on iOS prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page. 2019-05-23 4.3 CVE-2019-5801
MISC
MISC
google — chrome Insufficient policy enforcement in Content Security Policy in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page. 2019-05-23 4.3 CVE-2019-5803
MISC
MISC
ibm — api_connect IBM API Connect 5.0.0.0, and 5.0.8.6 could could return sensitive information that could provide critical information as to the underlying software stack in CMC UI headers. IBM X-Force ID: 154284. 2019-05-22 4.0 CVE-2018-1991
XF
CONFIRM
ibm — bigfix_platform IBM BigFix Platform 9.2 and 9.5 could allow a low-privilege user to manipulate the UI into exposing interface elements and information normally restricted to administrators. IBM X-Force ID: 156570. 2019-05-20 4.0 CVE-2019-4058
XF
CONFIRM
ibm — cloud_private IBM Cloud Private Kubernetes API server 2.1.0, 3.1.0, 3.1.1, and 3.1.2 can be used as an HTTP proxy to not only cluster internal but also external target IP addresses. IBM X-Force ID: 158145. 2019-05-17 5.0 CVE-2019-4119
CONFIRM
XF
identityserver — identityserver4 IdentityServer IdentityServer4 through 2.4 has stored XSS via the httpContext to the host/Extensions/RequestLoggerMiddleware.cs LogForErrorContext method, which can be triggered by viewing a log. 2019-05-21 4.3 CVE-2019-12250
MISC
intel — active_management_technology Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. 2019-05-17 4.6 CVE-2019-0092
MISC
intel — active_management_technology Out of bound write vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an authenticated user to potentially enable escalation of privilege via adjacent network access. 2019-05-17 5.2 CVE-2019-0096
MISC
intel — acu_wizard Improper directory permissions in Intel(R) ACU Wizard version 12.0.0.129 and earlier may allow an authenticated user to potentially enable escalation of privilege via local access. 2019-05-17 4.6 CVE-2019-0138
MISC
intel — converged_security_management_engine_firmware Insufficient access control vulnerability in Dynamic Application Loader software for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access. 2019-05-17 4.6 CVE-2019-0086
MISC
intel — converged_security_management_engine_firmware Buffer overflow in subsystem in Intel(R) DAL before version 12.0.35 may allow a privileged user to potentially enable escalation of privilege via local access. 2019-05-17 4.6 CVE-2019-0170
MISC
intel — nuc_kit_firmware Insufficient input validation in system firmware for Intel (R) NUC Kit may allow an authenticated user to potentially enable escalation of privilege, denial of service, and/or information disclosure via local access. 2019-05-17 4.6 CVE-2019-11094
MISC
intel — proset/wireless_wifi Improper directory permissions in the installer for Intel(R) PROSet/Wireless WiFi Software version 20.100 and earlier may allow an authenticated user to potentially enable escalation of privilege via local access. 2019-05-17 4.6 CVE-2018-3701
BID
CONFIRM
MISC
intel — scs_discovery_utility Unquoted service path in the installer for the Intel(R) SCS Discovery Utility version 12.0.0.129 and earlier may allow an authenticated user to potentially enable escalation of privilege via local access. 2019-05-17 4.6 CVE-2019-11093
MISC
intel — unite Data Corruption in Intel Unite(R) Client before version 3.3.176.13 may allow an unauthenticated user to potentially cause a denial of service via network access. 2019-05-17 5.0 CVE-2019-0132
BID
MISC
jenkins — credentials Jenkins Credentials Plugin 2.1.18 and earlier allowed users with permission to create or update credentials to confirm the existence of files on the Jenkins master with an attacker-specified path, and obtain the certificate content of files containing a PKCS#12 certificate. 2019-05-21 4.0 CVE-2019-10320
FULLDISC
MLIST
MISC
jenkins — pluggable_authentication_module A missing permission check in Jenkins PAM Authentication Plugin 1.5 and earlier, except 1.4.1 in PamSecurityRealm.DescriptorImpl#doTest allowed users with Overall/Read permission to obtain limited information about the file /etc/shadow and the user Jenkins is running as. 2019-05-21 4.0 CVE-2019-10319
MLIST
MISC
joomla — joomla! An issue was discovered in Joomla! before 3.9.6. The debug views of com_users do not properly escape user supplied data, which leads to a potential XSS attack vector. 2019-05-20 4.3 CVE-2019-11809
MISC
jreast — jr_east_japan JR East Japan train operation information push notification App for Android version 1.2.4 and earlier allows remote attackers to bypass access restriction to obtain or alter the user’s registered information via unspecified vectors. 2019-05-17 6.4 CVE-2019-5954
MISC
MISC
kentico — kentico Kentico 11 through 12 lets attackers upload and explore files without authentication via the cmsmodules/medialibrary/formcontrols/liveselectors/insertimageormedia/tabs_media.aspx URI. 2019-05-22 6.4 CVE-2019-12102
MISC
MISC
MISC
leanify_project — leanify Leanify 0.4.3 allows remote attackers to trigger an out-of-bounds write (1024 bytes) via a modified input file. 2019-05-23 4.3 CVE-2019-12298
MISC
libav — libav In libavcodec in Libav 9.21, ff_h264_execute_ref_pic_marking() has a heap-based buffer over-read. 2019-05-22 4.3 CVE-2017-5984
MISC
MISC
libsdl — sdl2_image An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9 when used in conjunction with libSDL2_image.a in SDL2_image 2.0.4. There is a heap-based buffer overflow in the SDL2_image function IMG_LoadPCX_RW at IMG_pcx.c. 2019-05-20 4.3 CVE-2019-12216
MISC
libsdl — sdl2_image An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9 when used in conjunction with libSDL2_image.a in SDL2_image 2.0.4. There is a NULL pointer dereference in the SDL stdio_read function in file/SDL_rwops.c. 2019-05-20 4.3 CVE-2019-12217
MISC
libsdl — sdl2_image An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9 when used in conjunction with libSDL2_image.a in SDL2_image 2.0.4. There is a NULL pointer dereference in the SDL2_image function IMG_LoadPCX_RW at IMG_pcx.c. 2019-05-20 4.3 CVE-2019-12218
MISC
libsdl — sdl2_image An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9 when used in conjunction with libSDL2_image.a in SDL2_image 2.0.4. There is an invalid free error in the SDL function SDL_SetError_REAL at SDL_error.c. 2019-05-20 6.8 CVE-2019-12219
MISC
libsdl — sdl2_image An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9 when used in conjunction with libSDL2_image.a in SDL2_image 2.0.4. There is an out-of-bounds read in the SDL function SDL_FreePalette_REAL at video/SDL_pixels.c. 2019-05-20 4.3 CVE-2019-12220
MISC
libsdl — sdl2_image An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9 when used in conjunction with libSDL2_image.a in SDL2_image 2.0.4. There is a SEGV in the SDL function SDL_free_REAL at stdlib/SDL_malloc.c. 2019-05-20 4.3 CVE-2019-12221
MISC
libsdl — simple_directmedia_layer An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9. There is an out-of-bounds read in the function SDL_InvalidateMap at video/SDL_pixels.c. 2019-05-20 4.3 CVE-2019-12222
MISC
linux — linux_kernel In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343. 2019-05-17 4.9 CVE-2018-7191
BID
MISC
MISC
MISC
MISC
MISC
MISC
MISC
macdown_project — macdown MacDown 0.7.1 (870) allows remote code execution via a file:\\\ URI, with a .app pathname, in the HREF attribute of an A element. This is different from CVE-2019-12138. 2019-05-17 6.8 CVE-2019-12173
MISC
matomo — matomo ** DISPUTED ** A full path disclosure vulnerability was discovered in Matomo v3.9.1 where a user can trigger a particular error to discover the full path of Matomo on the disk, because lastError.file is used in plugins/CorePluginsAdmin/templates/safemode.twig. NOTE: the vendor disputes the significance of this issue, stating “avoid reporting path disclosures, as we don’t consider them as security vulnerabilities.” 2019-05-20 4.0 CVE-2019-12215
MISC
mylittleforum — my_little_forum my little forum before 2.4.20 allows CSRF to delete posts, as demonstrated by mode=posting&delete_posting. 2019-05-21 5.8 CVE-2019-12253
MISC
MISC
odoo — odoo Odoo Version <= 8.0-20160726 and Version 9 is affected by: CWE-601: Open redirection. The impact is: obtain sensitive information (remote). 2019-05-22 5.8 CVE-2017-5871
MISC
MISC
open-emr — openemr An issue was discovered in OpenEMR before 5.0.1 Patch 7. Directory Traversal exists via docid=../ to /portal/lib/download_template.php. 2019-05-17 5.0 CVE-2018-17180
MISC
MISC
open-xchange — open-xchange_appsuite Open-Xchange GmbH OX App Suite 7.8.4 and earlier is affected by: SSRF. 2019-05-23 4.0 CVE-2017-15029
MISC
MISC
CONFIRM
open-xchange — open-xchange_appsuite Open-Xchange GmbH OX App Suite 7.8.4 and earlier is affected by: Cross Site Scripting (XSS). 2019-05-23 4.3 CVE-2017-15030
MISC
MISC
CONFIRM
open-xchange — open-xchange_appsuite Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Information Exposure. 2019-05-23 5.0 CVE-2017-5210
MISC
MISC
CONFIRM
open-xchange — open-xchange_appsuite Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Content Spoofing. 2019-05-23 5.0 CVE-2017-5211
MISC
MISC
CONFIRM
open-xchange — open-xchange_appsuite Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Cross Site Scripting (XSS). 2019-05-23 4.3 CVE-2017-5213
MISC
MISC
CONFIRM
open-xchange — open-xchange_appsuite Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Cross Site Scripting (XSS). 2019-05-22 4.3 CVE-2017-5864
MISC
MISC
CONFIRM
open-xchange — open-xchange_appsuite Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Incorrect Access Control. 2019-05-22 6.5 CVE-2017-6912
MISC
MISC
CONFIRM
open-xchange — open-xchange_appsuite Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Incorrect Access Control. 2019-05-22 6.5 CVE-2017-8340
MISC
MISC
CONFIRM
open-xchange — open-xchange_appsuite Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Content Spoofing. 2019-05-22 5.0 CVE-2017-8341
MISC
MISC
CONFIRM
open-xchange — open-xchange_appsuite OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: Cross Site Scripting (XSS). 2019-05-22 4.3 CVE-2017-9808
MISC
CONFIRM
open-xchange — open-xchange_appsuite OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: Information Exposure. 2019-05-22 5.0 CVE-2017-9809
MISC
CONFIRM
open-xchange — ox_cloud Open-Xchange GmbH OX Cloud Plugins 1.4.0 and earlier is affected by: Missing Authorization. 2019-05-22 6.5 CVE-2017-8777
MISC
CONFIRM
otrs — otrs An issue was discovered in Open Ticket Request System (OTRS) 5.x through 5.0.34, 6.x through 6.0.17, and 7.x through 7.0.6. An attacker who is logged into OTRS as an agent user with appropriate permissions may try to import carefully crafted Report Statistics XML that will result in reading of arbitrary files on the OTRS filesystem. 2019-05-21 4.0 CVE-2019-9892
CONFIRM
MISC
pfsense — pfsense Incorrect access control in the WebUI in OPNsense before version 19.1.8, and pfsense before 2.4.4-p3 allows remote authenticated users to escalate privileges to administrator via a specially crafted request. 2019-05-20 6.5 CVE-2019-11816
CONFIRM
CONFIRM
projectsend — projectsend CSV Injection was discovered in ProjectSend before r1053, affecting victims who import the data into Microsoft Excel. 2019-05-22 6.8 CVE-2018-7201
MISC
projectsend — projectsend An issue was discovered in ProjectSend before r1053. XSS exists in the “Name” field on the My Account page. 2019-05-22 4.3 CVE-2018-7202
MISC
qemu — qemu interface_release_resource in hw/display/qxl.c in QEMU 4.0.0 has a NULL pointer dereference. 2019-05-24 5.0 CVE-2019-12155
CONFIRM
MISC
qemu — qemu QEMU 3.0.0 has an Integer Overflow because the qga/commands*.c files do not check the length of the argument list or the number of environment variables. 2019-05-22 5.0 CVE-2019-12247
BID
MISC
MISC
redhat — libvirt A vulnerability was found in libvirt >= 4.1.0 in the virtlockd-admin.socket and virtlogd-admin.socket systemd units. A missing SocketMode configuration parameter allows any user on the host to connect using virtlockd-admin-sock or virtlogd-admin-sock and perform administrative tasks against the virtlockd and virtlogd daemons. 2019-05-22 6.5 CVE-2019-10132
REDHAT
REDHAT
CONFIRM
FEDORA
MISC
schneider-electric — 140cra312xxx_firmware CWE-119: Buffer errors vulnerability exists in Modicon M580 with firmware prior to V2.50, Modicon M340 with firmware prior to V3.01, BMxCRA312xx with firmware prior to V2.40, All firmware versions of Modicon Premium and 140CRA312xxx when sending a specially crafted Modbus packet, which could cause a denial of service to the device that would force a restart to restore availability. 2019-05-22 6.8 CVE-2018-7851
MISC
schneider-electric — atv_imc_drive_controller_firmware A CWE-306: Missing Authentication for Critical Function vulnerability exists which could cause a modification of device IP configuration (IP address, network mask and gateway IP address) when a specific Ethernet frame is received in all versions of: Modicon M100, Modicon M200, Modicon M221, ATV IMC drive controller, Modicon M241, Modicon M251, Modicon M258, Modicon LMC058, Modicon LMC078, PacDrive Eco ,PacDrive Pro, PacDrive Pro2 2019-05-22 6.4 CVE-2019-6820
MISC
schneider-electric — bmx-nor-0200h_firmware A CWE-798 use of hardcoded credentials vulnerability exists in BMX-NOR-0200H with firmware versions prior to V1.7 IR 19 which could cause a confidentiality issue when using FTP protocol. 2019-05-22 4.0 CVE-2019-6812
MISC
schneider-electric — modicon_m340_firmware A CWE-248: Uncaught Exception vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause denial of service when reading memory blocks with an invalid data size or with an invalid data offset in the controller over Modbus. 2019-05-22 5.0 CVE-2018-7843
MISC
schneider-electric — modicon_m340_firmware A CWE-200: Information Exposure vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause the disclosure of SNMP information when reading memory blocks from the controller over Modbus. 2019-05-22 5.0 CVE-2018-7844
MISC
schneider-electric — modicon_m340_firmware A CWE-125: Out-of-bounds Read vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause the disclosure of unexpected data from the controller when reading specific memory blocks in the controller over Modbus. 2019-05-22 5.0 CVE-2018-7845
MISC
schneider-electric — modicon_m340_firmware A CWE-501: Trust Boundary Violation vulnerability on connection to the Controller exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum and Modicon Premium which could cause unauthorized access by conducting a brute force attack on Modbus protocol to the controller. 2019-05-22 5.0 CVE-2018-7846
MISC
schneider-electric — modicon_m340_firmware A CWE-248: Uncaught Exception vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum and Modicon Premium which could cause a possible Denial of Service due to improper data integrity check when sending files the controller over Modbus. 2019-05-22 5.0 CVE-2018-7849
MISC
schneider-electric — modicon_m340_firmware A CWE-807: Reliance on Untrusted Inputs in a Security Decision vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause invalid information displayed in Unity Pro software. 2019-05-22 5.0 CVE-2018-7850
MISC
schneider-electric — modicon_m340_firmware A CWE-248: Uncaught Exception vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause denial of service when an invalid private command parameter is sent to the controller over Modbus. 2019-05-22 5.0 CVE-2018-7852
MISC
schneider-electric — modicon_m340_firmware CWE-330: Use of Insufficiently Random Values vulnerability, which could cause the hijacking of the TCP connection when using Ethernet communication in Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum. 2019-05-22 5.0 CVE-2019-6821
MISC
schneider-electric — modicon_premium_firmware A CWE-200: Information Exposure vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause the disclosure of SNMP information when reading files from the controller over Modbus 2019-05-22 5.0 CVE-2018-7848
MISC
schneider-electric — modicon_premium_firmware A CWE-248: Uncaught Exception vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause denial of service when reading invalid physical memory blocks in the controller over Modbus 2019-05-22 5.0 CVE-2018-7853
MISC
schneider-electric — modicon_premium_firmware A CWE-248 Uncaught Exception vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause a denial of Service when sending invalid debug parameters to the controller over Modbus. 2019-05-22 5.0 CVE-2018-7854
MISC
schneider-electric — modicon_premium_firmware A CWE-248 Uncaught Exception vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause a Denial of Service when sending invalid breakpoint parameters to the controller over Modbus 2019-05-22 5.0 CVE-2018-7855
MISC
schneider-electric — modicon_premium_firmware A CWE-248: Uncaught Exception vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause a possible denial of Service when writing invalid memory blocks to the controller over Modbus. 2019-05-22 5.0 CVE-2018-7856
MISC
schneider-electric — modicon_premium_firmware A CWE-200: Information Exposure vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause the disclosure of SNMP information when reading variables in the controller using Modbus. 2019-05-22 5.0 CVE-2019-6806
MISC
schneider-electric — modicon_premium_firmware A CWE-248: Uncaught Exception vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause a possible denial of service when writing sensitive application variables to the controller over Modbus. 2019-05-22 5.0 CVE-2019-6807
MISC
schneider-electric — modicon_premium_firmware A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists which could cause a possible Denial of Service when specific Modbus frames are sent to the controller in the products: Modicon M340 – firmware versions prior to V3.01, Modicon M580 – firmware versions prior to V2.80, All firmware versions of Modicon Quantum and Modicon Premium. 2019-05-22 5.0 CVE-2019-6819
MISC
schneider-electric — modicon_quantum_firmware In Modicon Quantum all firmware versions, CWE-264: Permissions, Privileges, and Access Control vulnerabilities could cause a denial of service or unauthorized modifications of the PLC configuration when using Ethernet/IP protocol. 2019-05-22 6.4 CVE-2019-6815
MISC
schneider-electric — modicon_quantum_firmware In Modicon Quantum all firmware versions, a CWE-94: Code Injection vulnerability could cause an unauthorized firmware modification with possible Denial of Service when using Modbus protocol. 2019-05-22 6.4 CVE-2019-6816
MISC
schneider-electric — somachine_basic An Environment (CWE-2) vulnerability exists in SoMachine Basic, all versions, and Modicon M221(all references, all versions prior to firmware V1.10.0.0) which could cause cycle time impact when flooding the M221 ethernet interface while the Ethernet/IP adapter is activated. 2019-05-22 5.0 CVE-2018-7821
MISC
schneider-electric — somachine_basic A Environment (CWE-2) vulnerability exists in SoMachine Basic, all versions, and Modicon M221(all references, all versions prior to firmware V1.10.0.0) which could cause remote launch of SoMachine Basic when sending crafted ethernet message. 2019-05-22 5.0 CVE-2018-7823
MISC
schneider-electric — triconex_tristation_emulator A CWE-754 Improper Check for Unusual or Exceptional Conditions vulnerability exists in Triconex TriStation Emulator V1.2.0, which could cause the emulator to crash when sending a specially crafted packet. The emulator is used infrequently for application logic testing. It is susceptible to an attack only while running in off-line mode. This vulnerability does not exist in Triconex hardware products and therefore has no effect on the operating safety functions in a plant. 2019-05-22 4.3 CVE-2018-7803
MISC
schneider-electric — tsxetg100_firmware A CWE-79 Cross-Site Scripting vulnerability exists in all versions of the TSXETG100 allowing an attacker to send a specially crafted URL with an embedded script to a user that would then be executed within the context of that user. 2019-05-22 4.3 CVE-2018-7834
MISC
soumu — electronic_reception_and_examination_of_application_for_radio_licenses Untrusted search path vulnerability in Installer of Electronic reception and examination of application for radio licenses Online 1.0.9.0 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. 2019-05-17 6.8 CVE-2019-5957
MISC
MISC
soumu — electronic_reception_and_examination_of_application_for_radio_licenses Untrusted search path vulnerability in Electronic reception and examination of application for radio licenses Offline 1.0.9.0 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. 2019-05-17 6.8 CVE-2019-5958
MISC
MISC
typora — typora Typora 0.9.9.21.1 (1913) allows arbitrary code execution via a modified file: URL syntax in the HREF attribute of an AREA element, as demonstrated by file:\\\ on macOS or Linux, or file://C| on Windows. This is different from CVE-2019-12137. 2019-05-17 6.8 CVE-2019-12172
MISC
ucms_project — ucms sadmin/ceditpost.php in UCMS 1.4.7 allows SQL Injection via the index.php?do=sadmin_ceditpost cvalue parameter. 2019-05-21 6.5 CVE-2019-12251
MISC
valvesoftware — steam In Valve Steam 1528829181 BETA, it is possible to perform a homograph / homoglyph attack to create fake URLs in the client, which may trick users into visiting unintended web sites. 2019-05-20 5.8 CVE-2018-12270
MISC
vtiger — vtiger_crm SQL injection vulnerability in Vtiger CRM before 7.1.0 hotfix3 allows authenticated users to execute arbitrary SQL commands. 2019-05-17 6.5 CVE-2019-11057
MLIST
MISC
webpagetest — webpagetest WPO WebPageTest 19.04 allows SSRF because ValidateURL in www/runtest.php does not consider octal encoding of IP addresses (such as 0300.0250 as a replacement for 192.168). 2019-05-17 4.0 CVE-2019-12161
MISC
westermo — dr-250_firmware XSS exists in the /cmdexec/cmdexe?cmd= function in Westermo DR-250 Pre-5162 and DR-260 Pre-5162 routers. 2019-05-23 4.3 CVE-2018-19614
MISC
MISC
wireshark — wireshark In Wireshark 3.0.0 to 3.0.1, 2.6.0 to 2.6.8, and 2.4.0 to 2.4.14, the dissection engine could crash. This was addressed in epan/packet.c by restricting the number of layers and consequently limiting recursion. 2019-05-23 5.0 CVE-2019-12295
MISC
MISC
MISC
wordpress — wordpress WordPress 4.7.2 mishandles listings of post authors, which allows remote attackers to obtain sensitive information (Path Disclosure) via a /wp-json/oembed/1.0/embed?url= request, related to the “author_name”:” substring. 2019-05-22 5.0 CVE-2017-6514
BID
MISC
MISC
wpbookingsystem — wp_booking_system The WP Booking System plugin 1.5.1 for WordPress has no CSRF protection, which allows attackers to reach certain SQL injection issues that require administrative access. 2019-05-20 6.5 CVE-2019-12239
MISC
MISC
wso2 — api_manager An issue was discovered in WSO2 API Manager 2.6.0. It is possible for a logged-in user to upload, as API documentation, any type of file by changing the extension to an allowed one. 2019-05-21 5.5 CVE-2019-6513
MISC
MISC
zohocorp — manageengine_applications_manager An issue was discovered in ZOHO ManageEngine Applications Manager 12.3. It is possible for an unauthenticated user to view the list of domain names and usernames used in a company’s network environment via a userconfiguration.do?method=editUser request. 2019-05-23 5.0 CVE-2017-11557
MISC
MISC
MISC
MISC
zohocorp — manageengine_applications_manager In Zoho ManageEngine Application Manager 13.1 Build 13100, the ‘haid’ parameter of the ‘/auditLogAction.do’ module is vulnerable to a Time-based Blind SQL Injection attack. 2019-05-23 6.8 CVE-2017-11738
MISC
MISC
MISC
zohocorp — manageengine_applications_manager In Zoho ManageEngine Application Manager 13.1 Build 13100, an authenticated user, with administrative privileges, has the ability to add a widget on any dashboard. This widget can be a “Utility Widget” with a “Custom HTML or Text” field. Once this widget is created, it will be loaded on the dashboard where it was added. An attacker can abuse this functionality by creating a “Utility Widget” that contains malicious JavaScript code, aka XSS. 2019-05-23 4.3 CVE-2017-11739
MISC
MISC
zohocorp — manageengine_applications_manager In Zoho ManageEngine Application Manager 13.1 Build 13100, the administrative user has the ability to upload files/binaries that can be executed upon the occurrence of an alarm. An attacker can abuse this functionality by uploading a malicious script that can be executed on the remote system. 2019-05-23 6.8 CVE-2017-11740
MISC
MISC
zohocorp — manageengine_opmanager An issue was discovered in ZOHO ManageEngine OpManager 12.2. The ‘apiKey’ parameter of “/api/json/admin/getmailserversettings” and “/api/json/dashboard/gotoverviewlist” is vulnerable to a Blind SQL Injection attack. 2019-05-23 5.0 CVE-2017-11559
MISC
MISC
MISC
zohocorp — manageengine_opmanager An issue was discovered in ZOHO ManageEngine OpManager 12.2. An authenticated user can upload any file they want to share in the “Group Chat” or “Alarm” section. This functionality can be abused by a malicious user by uploading a web shell. 2019-05-23 4.0 CVE-2017-11561
MISC
MISC
MISC
zohocorp — manageengine_servicedesk_plus An issue was discovered in Zoho ManageEngine ServiceDesk Plus 9.3. There is XSS via the SearchN.do search field. 2019-05-21 4.3 CVE-2019-12189
MISC
MISC
MISC
zohocorp — manageengine_servicedesk_plus In Zoho ManageEngine ServiceDesk Plus through 10.5, users with the lowest privileges (guest) can view an arbitrary post by appending its number to the SDNotify.do?notifyModule=Solution&mode=E-Mail&notifyTo=SOLFORWARD&id= substring. 2019-05-21 4.0 CVE-2019-12252
MISC
BID
MISC
MISC

Back to top

 

Low Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
boostio — boostnote There is XSS in browser/components/MarkdownPreview.js in BoostIO Boostnote 0.11.15 via a label named flowchart, sequence, gallery, or chart, as demonstrated by a crafted SRC attribute of an IFRAME element, a different vulnerability than CVE-2019-12136. 2019-05-19 3.5 CVE-2019-12184
MISC
centos-webpanel — centos_web_panel XSS was discovered in CentOS-WebPanel.com (aka CWP) CentOS Web Panel through 0.9.8.747 via the testacc/fileManager2.php fm_current_dir or filename parameter. 2019-05-21 3.5 CVE-2019-12190
MISC
ibm — bigfix_platform IBM BigFix Platform 9.2 and 9.5 stores potentially sensitive information in process memory that could be read by a local attacker with elevated permissions. IBM X-Force ID: 155007 2019-05-20 2.1 CVE-2018-2005
XF
CONFIRM
ibm — bigfix_platform IBM BigFix Platform 9.2 and 9.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 155885. 2019-05-20 3.5 CVE-2019-4011
XF
CONFIRM
ibm — websphere_mq IBM WebSphere MQ 8.0.0.0 through 8.0.0.9 and 9.0.0.0 through 9.1.1 could allow a local attacker to cause a denial of service within the error log reporting system. IBM X-Force ID: 156163. 2019-05-23 2.1 CVE-2019-4039
XF
CONFIRM
intel — active_management_technology Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable denial of service via adjacent network access. 2019-05-17 3.3 CVE-2019-0094
MISC
intel — atom_230_firmware Insufficient key protection vulnerability in silicon reference firmware for Intel(R) Pentium(R) Processor J Series, Intel(R) Pentium(R) Processor N Series, Intel(R) Celeron(R) J Series, Intel(R) Celeron(R) N Series, Intel(R) Atom(R) Processor A Series, Intel(R) Atom(R) Processor E3900 Series, Intel(R) Pentium(R) Processor Silver Series may allow a privileged user to potentially enable denial of service via local access. 2019-05-17 2.1 CVE-2019-0120
MISC
intel — driver_&_support_assistant Insufficient access control in Intel(R) Driver & Support Assistant version 19.3.12.3 and before may allow a privileged user to potentially enable information disclosure via local access. 2019-05-17 2.1 CVE-2019-11095
CONFIRM
MISC
intel — driver_&_support_assistant Insufficient input validation in Intel(R) Driver & Support Assistant version 19.3.12.3 and before may allow a privileged user to potentially enable denial of service via local access. 2019-05-17 2.1 CVE-2019-11114
MISC
intel — graphics_driver Insufficient bounds checking in Intel(R) Graphics Drivers before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable a denial of service via local access. 2019-05-17 2.1 CVE-2019-0113
BID
MISC
intel — graphics_driver A race condition in Intel(R) Graphics Drivers before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable a denial of service via local access. 2019-05-17 1.9 CVE-2019-0114
BID
MISC
intel — graphics_driver Insufficient input validation in KMD module for Intel(R) Graphics Driver before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable denial of service via local access. 2019-05-17 2.1 CVE-2019-0115
BID
MISC
intel — graphics_driver An out of bound read in KMD module for Intel(R) Graphics Driver before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow a privileged user to potentially enable denial of service via local access. 2019-05-17 2.1 CVE-2019-0116
BID
MISC
open-xchange — open-xchange_appsuite OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: Cross Site Scripting (XSS). 2019-05-23 3.5 CVE-2017-13668
MISC
CONFIRM
open-xchange — open-xchange_appsuite OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: Cross Site Scripting (XSS). 2019-05-23 3.5 CVE-2017-17061
MISC
CONFIRM
otrs — otrs An issue was discovered in Open Ticket Request System (OTRS) 7.x through 7.0.6, Community Edition 6.0.x through 6.0.17, and OTRSAppointmentCalendar 5.0.x through 5.0.12. An attacker who is logged into OTRS as an agent with appropriate permissions may create a carefully crafted calendar appointment in order to cause execution of JavaScript in the context of OTRS. 2019-05-21 3.5 CVE-2019-10066
CONFIRM
otrs — otrs An issue was discovered in Open Ticket Request System (OTRS) 7.x through 7.0.6 and Community Edition 5.0.x through 5.0.35 and 6.0.x through 6.0.17. An attacker who is logged into OTRS as an agent user with appropriate permissions may manipulate the URL to cause execution of JavaScript in the context of OTRS. 2019-05-21 3.5 CVE-2019-10067
CONFIRM
ovirt — cockpit-ovirt During HE deployment via cockpit-ovirt, cockpit-ovirt generates an ansible variable file `/var/lib/ovirt-hosted-engine-setup/cockpit/ansibleVarFileXXXXXX.var` which contains the admin and the appliance passwords as plain-text. At the of the deployment procedure, these files are deleted. 2019-05-17 2.1 CVE-2019-10139
BID
CONFIRM
schneider-electric — somachine_basic An Incorrect Default Permissions (CWE-276) vulnerability exists in SoMachine Basic, all versions, and Modicon M221(all references, all versions prior to firmware V1.10.0.0) which could cause unauthorized access to SoMachine Basic resource files when logged on the system hosting SoMachine Basic. 2019-05-22 2.1 CVE-2018-7822
MISC
zohocorp — manageengine_opmanager An issue was discovered in ZOHO ManageEngine OpManager 12.2. By adding a Google Map to the application, an authenticated user can upload an HTML file. This HTML file is then rendered in various locations of the application. JavaScript inside the uploaded HTML is also interpreted by the application. Thus, an attacker can inject a malicious JavaScript payload inside the HTML file and upload it to the application. 2019-05-23 3.5 CVE-2017-11560
MISC
MISC
MISC

Back to top

 

Severity Not Yet Assigned

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
adobe — acrobat_and_reader Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 not yet calculated CVE-2019-7023
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 not yet calculated CVE-2019-7046
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 not yet calculated CVE-2019-7029
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2019-05-24 not yet calculated CVE-2019-7047
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . 2019-05-24 not yet calculated CVE-2019-7048
CONFIRM
adobe — acrobat_and_reader Adobe Acr