CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities (CVSS score between 5 and 5.99)

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
101 CVE-2019-13590 190 Overflow 2019-07-14 2019-07-30
5.0
None Remote Low Not required None None Partial
An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c.
102 CVE-2019-13584 22 Dir. Trav. 2019-07-17 2019-08-01
5.0
None Remote Low Not required Partial None None
The remote admin webserver on FANUC Robotics Virtual Robot Controller 8.23 allows Directory Traversal via a forged HTTP request.
103 CVE-2019-13565 287 2019-07-26 2019-08-18
5.0
None Remote Low Not required Partial None None
An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.
104 CVE-2019-13560 255 2019-07-11 2019-07-12
5.0
None Remote Low Not required None Partial None
D-Link DIR-655 C devices before 3.02B05 BETA03 allow remote attackers to force a blank password via the apply_sec.cgi setup_wizard parameter.
105 CVE-2019-13509 532 2019-07-18 2019-08-06
5.0
None Remote Low Not required Partial None None
In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes (non external) secrets. It potentially applies to other API users of the stack API if they resend the secret.
106 CVE-2019-13503 125 2019-07-10 2019-07-12
5.0
None Remote Low Not required None None Partial
mq_parse_http in mongoose.c in Mongoose 6.15 has a heap-based buffer over-read.
107 CVE-2019-13498 254 2019-07-29 2019-08-05
5.8
None Remote Medium Not required Partial Partial None
One Identity Cloud Access Manager 8.1.3 does not use HTTP Strict Transport Security (HSTS), which may allow man-in-the-middle (MITM) attacks. This issue is fixed in version 8.1.4.
108 CVE-2019-13464 434 Bypass 2019-07-09 2019-07-15
5.0
None Remote Low Not required None Partial None
An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) 3.0.2. Use of X.Filename instead of X_Filename can bypass some PHP Script Uploads rules, because PHP automatically transforms dots into underscores in certain contexts where dots are invalid.
109 CVE-2019-13461 200 +Info 2019-07-09 2019-07-16
5.0
None Remote Low Not required Partial None None
In PrestaShop before 1.7.6.0 RC2, the id_address_delivery and id_address_invoice parameters are affected by an Insecure Direct Object Reference vulnerability due to a guessable value sent to the web application during checkout. An attacker could leak personal customer information. This is PrestaShop bug #14444.
110 CVE-2019-13419 200 +Info 2019-08-13 2019-08-19
5.0
None Remote Low Not required Partial None None
Search Guard versions before 23.1 had an issue that for aggregations clear text values of anonymised fields were leaked.
111 CVE-2019-13418 129 2019-08-12 2019-08-19
5.0
None Remote Low Not required Partial None None
Search Guard versions before 24.0 had an issue that values of string arrays in documents are not properly anonymized.
112 CVE-2019-13417 200 +Info 2019-08-12 2019-08-19
5.0
None Remote Low Not required Partial None None
Search Guard versions before 24.0 had an issue that field caps and mapping API leak field names (but not values) for fields which are not allowed for the user when field level security (FLS) is activated.
113 CVE-2019-13403 284 2019-07-17 2019-07-18
5.0
None Remote Low Not required Partial None None
Temenos CWX version 8.9 has an Broken Access Control vulnerability in the module /CWX/Employee/EmployeeEdit2.aspx, leading to the viewing of user information.
114 CVE-2019-13400 255 2019-07-07 2019-07-09
5.0
None Remote Low Not required Partial None None
Dynacolor FCM-MB40 v1.2.0.0 use /etc/appWeb/appweb.pass to store administrative web-interface credentials in cleartext. These credentials can be retrieved via cgi-bin/getuserinfo.cgi?mode=info.
115 CVE-2019-13396 22 Dir. Trav. File Inclusion 2019-07-10 2019-07-17
5.0
None Remote Low Not required Partial None None
FlightPath 4.x and 5.0-x allows directory traversal and Local File Inclusion through the form_include parameter in an index.php?q=system-handle-form-submit POST request because of an include_once in system_handle_form_submit in modules/system/system.module.
116 CVE-2019-13383 200 +Info 2019-07-16 2019-08-09
5.0
None Remote Low Not required Partial None None
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.846, the Login process allows attackers to check whether a username is valid by reading the HTTP response.
117 CVE-2019-13344 287 Bypass 2019-07-05 2019-07-31
5.0
None Remote Low Not required None Partial None
An authentication bypass vulnerability in the CRUDLab WP Like Button plugin through 1.6.0 for WordPress allows unauthenticated attackers to change settings. The contains() function in wp_like_button.php did not check if the current request is made by an authorized user, thus allowing any unauthenticated user to successfully update settings, as demonstrated by the wp-admin/admin.php?page=facebook-like-button each_page_url or code_snippet parameter.
118 CVE-2019-13338 200 +Info 2019-07-09 2019-07-16
5.0
None Remote Low Not required Partial None None
In WESEEK GROWI before 3.5.0, a remote attacker can obtain the password hash of the creator of a page by leveraging wiki access to make API calls for page metadata. In other words, the password hash can be retrieved even though it is not a publicly available field.
119 CVE-2019-13337 287 Bypass 2019-07-09 2019-07-16
5.0
None Remote Low Not required None Partial None
In WESEEK GROWI before 3.5.0, the site-wide basic authentication can be bypassed by adding a URL parameter access_token (this is the parameter used by the API). No valid token is required since it is not validated by the backend. The website can then be browsed as if no basic authentication is required.
120 CVE-2019-13277 119 DoS Overflow 2019-07-09 2019-07-15
5.0
None Remote Low Not required None None Partial
TRENDnet TEW-827DRU with firmware up to and including 2.04B03 allows an unauthenticated attacker to execute setup wizard functionality, giving this attacker the ability to change configuration values, potentially leading to a denial of service. The request can be made on the local intranet or remotely if remote administration is enabled.
121 CVE-2019-13238 400 2019-07-04 2019-07-10
5.0
None Remote Low Not required None None Partial
An issue was discovered in Bento4 1.5.1.0. A memory allocation failure is unhandled in Core/Ap4SdpAtom.cpp and leads to crashes. When parsing input video, the program allocates a new buffer to parse an atom in the stream. The unhandled memory allocation failure causes a direct copy to a NULL pointer.
122 CVE-2019-13232 400 DoS 2019-07-04 2019-07-28
5.0
None Remote Low Not required None None Partial
Info-ZIP UnZip 6.0 mishandles the overlapping of files inside a ZIP container, leading to denial of service (resource consumption), aka a "better zip bomb" issue.
123 CVE-2019-13225 476 DoS 2019-07-10 2019-07-30
5.0
None Remote Low Not required None None Partial
A NULL Pointer Dereference in match_at() in regexec.c in Oniguruma 6.9.2 allows attackers to potentially cause denial of service by providing a crafted regular expression. Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
124 CVE-2019-13222 125 DoS 2019-08-15 2019-08-20
5.8
None Remote Medium Not required Partial None Partial
An out-of-bounds read of a global buffer in the draw_line function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service or disclose sensitive information by opening a crafted Ogg Vorbis file.
125 CVE-2019-13220 20 DoS 2019-08-15 2019-08-20
5.8
None Remote Medium Not required Partial None Partial
Use of uninitialized stack variables in the start_decoder function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service or disclose sensitive information by opening a crafted Ogg Vorbis file.
126 CVE-2019-13179 275 2019-07-02 2019-08-12
5.0
None Remote Low Not required Partial None None
Calamares versions 3.1 through 3.2.10 copies a LUKS encryption keyfile from /crypto_keyfile.bin (mode 0600 owned by root) to /boot within a globally readable initramfs image with insecure permissions, which allows this originally protected file to be read by any user, thereby disclosing decryption keys for LUKS containers created with Full Disk Encryption.
127 CVE-2019-13175 601 2019-07-02 2019-07-03
5.8
None Remote Medium Not required Partial Partial None
Read the Docs before 3.5.1 has an Open Redirect if certain user-defined redirects are used. This affects private instances of Read the Docs (in addition to the public readthedocs.org web sites).
128 CVE-2019-13146 20 Sql XSS 2019-07-09 2019-07-16
5.0
None Remote Low Not required None Partial None
The field_test gem 0.3.0 for Ruby has unvalidated input. A method call that is expected to return a value from a certain set of inputs can be made to return any input, which can be dangerous depending on how applications use it. If an application treats arbitrary variants as trusted, this can lead to a variety of potential vulnerabilities like SQL injection or cross-site scripting (XSS).
129 CVE-2019-13126 190 Overflow 2019-07-29 2019-07-31
5.0
None Remote Low Not required None None Partial
An integer overflow in NATS Server 2.0.0 allows a remote attacker to crash the server by sending a crafted request.
130 CVE-2019-13118 20 2019-06-30 2019-07-22
5.0
None Remote Low Not required Partial None None
In numbers.c in libxslt 1.1.33, a type holding grouping characters of an xsl:number instruction was too narrow and an invalid character/length combination could be passed to xsltNumberFormatDecimal, leading to a read of uninitialized stack data.
131 CVE-2019-13117 20 2019-06-30 2019-07-22
5.0
None Remote Low Not required Partial None None
In numbers.c in libxslt 1.1.33, an xsl:number with certain format strings could lead to a uninitialized read in xsltNumberFormatInsertNumbers. This could allow an attacker to discern whether a byte on the stack contains the characters A, a, I, i, or 0, or any other character.
132 CVE-2019-13115 190 DoS Overflow 2019-07-16 2019-07-25
5.8
None Remote Medium Not required Partial None Partial
In libssh2 before 1.9.0, kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c has an integer overflow that could lead to an out-of-bounds read in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server. This is related to an _libssh2_check_length mistake, and is different from the various issues fixed in 1.8.1, such as CVE-2019-3855.
133 CVE-2019-13097 20 2019-07-22 2019-07-26
5.0
None Remote Low Not required None Partial None
The application API of Cat Runner Decorate Home version 2.8.0 for Android does not sufficiently verify inputs that are assumed to be immutable but are actually externally controllable. Attackers can manipulate users' score parameters exchanged between client and server.
134 CVE-2019-13096 255 2019-07-22 2019-07-26
5.0
None Remote Low Not required Partial None None
TronLink Wallet 2.2.0 stores user wallet keystore in plaintext and places them in insecure storage. An attacker can read and reuse the user keystore of a valid user via /data/data/com.tronlink.wallet/shared_prefs/<wallet-name>.xml to gain unauthorized access.
135 CVE-2019-13075 200 +Info 2019-06-30 2019-07-08
5.0
None Remote Low Not required Partial None None
Tor Browser through 8.5.3 has an information exposure vulnerability. It allows remote attackers to detect the browser's language via vectors involving an IFRAME element, because text in that language is included in the title attribute of a LINK element for a non-HTML page. This is related to a behavior of Firefox before 68.
136 CVE-2019-13050 297 DoS 2019-06-29 2019-07-09
5.0
None Remote Low Not required None None Partial
Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
137 CVE-2019-13012 275 2019-06-28 2019-07-29
5.0
None Remote Low Not required None Partial None
The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL, NULL) and files using g_file_replace_contents (kfsb->file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL). Consequently, it does not properly restrict directory (and file) permissions. Instead, for directories, 0777 permissions are used; for files, default file permissions are used. This is similar to CVE-2019-12450.
138 CVE-2019-12995 20 2019-06-28 2019-07-02
5.0
None Remote Low Not required None None Partial
Istio before 1.2.2 mishandles certain access tokens, leading to "Epoch 0 terminated with an error" in Envoy. This is related to a jwt_authenticator.cc segmentation fault.
139 CVE-2019-12968 119 DoS Overflow 2019-06-26 2019-07-02
5.0
None Remote Low Not required None None Partial
A vulnerability was found in the Sonic Robo Blast 2 (SRB2) plugin (EP_Versions 9 to 11 inclusive) distributed with Doomseeker 1.1 and 1.2. Affected plugin versions did not discard IP packets with an unnaturally long response length from a Sonic Robo Blast 2 master server, allowing a remote attacker to cause a potential crash / denial of service in Doomseeker. The issue has been remediated in the Doomseeker 1.3 release with source code patches to the SRB2 plugin.
140 CVE-2019-12946 89 Sql 2019-07-19 2019-07-22
5.0
None Remote Low Not required Partial None None
Elcom CMS before 10.7 has SQL Injection via EventSearchByState.aspx and EventSearchAdv.aspx.
141 CVE-2019-12924 611 2019-07-08 2019-07-16
5.0
None Remote Low Not required Partial None None
MailEnable Enterprise Premium 10.23 was vulnerable to XML External Entity Injection (XXE) attacks that could be exploited by an unauthenticated user. It was possible for an attacker to use a vulnerability in the configuration of the XML processor to read any file on the host system. Because all credentials were stored in a cleartext file, it was possible to steal all users' credentials (including the highest privileged users).
142 CVE-2019-12914 287 2019-07-17 2019-07-22
5.0
None Remote Low Not required Partial None None
Redbrick Shift through 3.4.3 allows an attacker to extract authentication tokens of services (such as Gmail, Outlook, etc.) used in the application.
143 CVE-2019-12911 287 2019-07-17 2019-07-22
5.0
None Remote Low Not required Partial None None
Redbrick Shift through 3.4.3 allows an attacker to extract authentication tokens of services (such as Gmail, Outlook, etc.) used in the application.
144 CVE-2019-12897 284 2019-06-19 2019-06-21
5.0
None Remote Low Not required None None Partial
Edraw Max 7.9.3 has a Read Access Violation at the Instruction Pointer after a call from ObjectModule!Paint::Clear+0x0000000000000074.
145 CVE-2019-12896 119 Overflow 2019-06-19 2019-06-21
5.0
None Remote Low Not required None None Partial
Edraw Max 7.9.3 has Heap Corruption starting at ntdll!RtlpNtMakeTemporaryKey+0x0000000000001a77.
146 CVE-2019-12895 119 Overflow 2019-06-19 2019-06-21
5.0
None Remote Low Not required None None Partial
In Alternate Pic View 2.600, the Exception Handler Chain is Corrupted starting at PicViewer!PerfgrapFinalize+0x00000000000b916d.
147 CVE-2019-12894 284 2019-06-19 2019-06-21
5.0
None Remote Low Not required None None Partial
Alternate Pic View 2.600 has a Read Access Violation at the Instruction Pointer after a call from PicViewer!PerfgrapFinalize+0x00000000000a9a1b.
148 CVE-2019-12893 119 Overflow 2019-06-19 2019-06-21
5.0
None Remote Low Not required None None Partial
Alternate Pic View 2.600 has a User Mode Write AV starting at PicViewer!PerfgrapFinalize+0x00000000000a8868.
149 CVE-2019-12855 295 2019-06-16 2019-08-13
5.8
None Remote Medium Not required Partial Partial None
In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections.
150 CVE-2019-12845 20 2019-07-03 2019-07-05
5.0
None Remote Low Not required None Partial None
The generated Kotlin DSL settings allowed usage of an unencrypted connection for resolving artifacts. The issue was fixed in JetBrains TeamCity 2018.2.3.
Total number of vulnerabilities : 23027   Page : 1 2 3 (This Page)4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.