CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities (CVSS score between 6 and 6.99)

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
4301 CVE-2019-16113 94 Exec Code 2019-09-08 2020-07-27
6.5
None Remote Low ??? Partial Partial Partial
Bludit 3.9.2 allows remote code execution via bl-kernel/ajax/upload-images.php because PHP code can be entered with a .jpg file name, and then this PHP code can write other PHP code to a ../ pathname.
4302 CVE-2019-16112 502 Exec Code 2020-05-13 2020-05-15
6.5
None Remote Low ??? Partial Partial Partial
TylerTech Eagle 2018.3.11 deserializes untrusted user input, resulting in remote code execution via a crafted Java object to the recorder/ServiceManager?service=tyler.empire.settings.SettingManager URI.
4303 CVE-2019-16110 Exec Code 2019-11-14 2020-08-24
6.8
None Remote Medium Not required Partial Partial Partial
The network protocol of Blade Shadow though 2.13.3 allows remote attackers to take control of a Shadow instance and execute arbitrary code by only knowing the victim's IP address, because packet data can be injected into the unencrypted UDP packet stream.
4304 CVE-2019-16099 352 CSRF 2019-09-08 2019-09-09
6.8
None Remote Medium Not required Partial Partial Partial
Silver Peak EdgeConnect SD-WAN before 8.1.7.x allows CSRF via JSON data to a .swf file.
4305 CVE-2019-16071 269 Bypass 2020-03-20 2020-08-24
6.5
None Remote Low ??? Partial Partial Partial
Enigma NMS 65.0.0 and prior allows administrative users to create low-privileged accounts that do not have the ability to modify any settings in the system, only view the components. However, it is possible for a low-privileged user to perform all actions as an administrator by bypassing authorization controls and sending requests to the server in the context of an administrator.
4306 CVE-2019-16068 352 XSS CSRF 2020-03-19 2020-08-24
6.8
None Remote Medium Not required Partial Partial Partial
A CSRF vulnerability exists in NETSAS ENIGMA NMS version 65.0.0 and prior that could allow an attacker to be able to trick a victim into submitting a malicious manage_files.cgi request. This can be triggered via XSS or an IFRAME tag included within the site.
4307 CVE-2019-16061 276 2020-03-19 2020-03-23
6.5
None Remote Low ??? Partial Partial Partial
A number of files on the NETSAS Enigma NMS server 65.0.0 and prior are granted weak world-readable and world-writable permissions, allowing any low privileged user with access to the system to read sensitive data (e.g., .htpasswd) and create/modify/delete content (e.g., under /var/www/html/docs) within the operating system.
4308 CVE-2019-16059 352 CSRF 2019-09-06 2019-09-09
6.8
None Remote Medium Not required Partial Partial Partial
Sentrifugo 3.2 lacks CSRF protection. This could lead to an attacker tricking the administrator into executing arbitrary code at index.php/dashboard/viewprofile via a crafted HTML page.
4309 CVE-2019-16029 20 DoS 2020-01-26 2020-01-31
6.4
None Remote Low Not required None Partial Partial
A vulnerability in the application programming interface (API) of Cisco Smart Software Manager On-Prem could allow an unauthenticated, remote attacker to change user account information which can prevent users from logging in, resulting in a denial of service (DoS) condition of the web interface. The vulnerability is due to the lack of input validation in the API. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to change or corrupt user account information which could grant the attacker administrator access or prevent legitimate user access to the web interface, resulting in a denial of service (DoS) condition.
4310 CVE-2019-16004 306 Bypass 2020-09-23 2020-09-28
6.4
None Remote Low Not required Partial Partial None
A vulnerability in the REST API endpoint of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to bypass authentication on an affected device. The vulnerability is due to missing authentication on some of the API calls. An attacker could exploit this vulnerability by sending a request to one of the affected calls. A successful exploit could allow the attacker to interact with some parts of the API.
4311 CVE-2019-15972 89 Sql 2019-11-26 2019-12-09
6.5
None Remote Low ??? Partial Partial Partial
A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. The vulnerability exists because the web-based management interface improperly validates SQL values. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to modify values on or return values from the underlying database.
4312 CVE-2019-15966 20 DoS 2019-11-05 2019-11-07
6.8
None Remote Low ??? None None Complete
A vulnerability in the web application of Cisco TelePresence Advanced Media Gateway could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the lack of input validation in the web application. An attacker could exploit this vulnerability by sending a crafted authenticated HTTP request to the device. An exploit could allow the attacker to stop services on an affected device. The device may become inoperable and results in a denial of service (DoS) condition.
4313 CVE-2019-15962 276 2019-10-16 2019-10-22
6.6
None Local Low Not required None Complete Complete
A vulnerability in the CLI of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, local attacker to write files to the /root directory of an affected device. The vulnerability is due to improper permission assignment. An attacker could exploit this vulnerability by logging in as the remotesupport user and writing files to the /root directory of an affected device.
4314 CVE-2019-15960 269 +Priv 2019-11-26 2019-12-12
6.5
None Remote Low ??? Partial Partial Partial
A vulnerability in the Webex Network Recording Admin page of Cisco Webex Meetings could allow an authenticated, remote attacker to elevate privileges in the context of the affected page. To exploit this vulnerability, the attacker must be logged in as a low-level administrator. The vulnerability is due to insufficient access control validation. An attacker could exploit this vulnerability by submitting a crafted URL request to gain privileged access in the context of the affected page. A successful exploit could allow the attacker to elevate privileges in the Webex Recording Admin page, which could allow them to view or delete recordings that they would not normally be able to access.
4315 CVE-2019-15956 DoS +Priv 2019-11-26 2020-10-16
6.5
None Remote Low ??? Partial Partial Partial
A vulnerability in the web management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform an unauthorized system reset on an affected device. The vulnerability is due to improper authorization controls for a specific URL in the web management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could have a twofold impact: the attacker could either change the administrator password, gaining privileged access, or reset the network configuration details, causing a denial of service (DoS) condition. In both scenarios, manual intervention is required to restore normal operations.
4316 CVE-2019-15953 862 2019-09-05 2020-08-24
6.5
None Remote Low ??? Partial Partial Partial
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with limited privileges can get access to a resource that they do not own by calling the associated API. The product correctly manages privileges only for the front-end resource path, not for API requests. This leads to vertical and horizontal privilege escalation.
4317 CVE-2019-15952 22 Exec Code +Priv Dir. Trav. 2019-09-05 2019-09-06
6.5
None Remote Low ??? Partial Partial Partial
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the Pages privilege can conduct a path traversal attack (../) to include .html files that are outside the permitted directory. Also, if a page contains a template directive, then the directive will be server side processed. Thus, if a user can control the content of a .html file, then they can inject a payload with a malicious template directive to gain Remote Command Execution. The exploit will work only with the .html extension.
4318 CVE-2019-15943 787 DoS Exec Code 2019-09-19 2020-08-24
6.8
None Remote Medium Not required Partial Partial Partial
vphysics.dll in Counter-Strike: Global Offensive before 1.37.1.1 allows remote attackers to achieve code execution or denial of service by creating a gaming server and inviting a victim to this server, because a crafted map is mishandled during a memset call.
4319 CVE-2019-15942 252 2019-09-05 2020-08-24
6.8
None Remote Medium Not required Partial Partial Partial
FFmpeg through 4.2 has a "Conditional jump or move depends on uninitialised value" issue in h2645_parse because alloc_rbsp_buffer in libavcodec/h2645_parse.c mishandles rbsp_buffer.
4320 CVE-2019-15934 352 CSRF 2019-12-12 2019-12-13
6.8
None Remote Medium Not required Partial Partial Partial
Intesync Solismed 3.3sp has CSRF.
4321 CVE-2019-15917 416 2019-09-04 2020-03-09
6.9
None Local Medium Not required Complete Complete Complete
An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.
4322 CVE-2019-15893 Exec Code 2019-10-16 2020-08-24
6.5
None Remote Low ??? Partial Partial Partial
Sonatype Nexus Repository Manager 2.x before 2.14.15 allows Remote Code Execution.
4323 CVE-2019-15873 94 Exec Code 2019-09-03 2019-09-05
6.5
None Remote Low ??? Partial Partial Partial
The profilegrid-user-profiles-groups-and-communities plugin before 2.8.6 for WordPress has remote code execution via an wp-admin/admin-ajax.php request with the action=pm_template_preview&html=<?php substring followed by PHP code.
4324 CVE-2019-15868 352 CSRF 2019-09-03 2019-09-03
6.8
None Remote Medium Not required Partial Partial Partial
The affiliates-manager plugin before 2.6.6 for WordPress has CSRF.
4325 CVE-2019-15867 798 2019-09-03 2019-09-06
6.5
None Remote Low ??? Partial Partial Partial
The slick-popup plugin before 1.7.2 for WordPress has a hardcoded OmakPass13# password for the slickpopupteam account, after a Subscriber calls a certain AJAX action.
4326 CVE-2019-15866 434 2019-09-03 2019-09-05
6.5
None Remote Low ??? Partial Partial Partial
The crelly-slider plugin before 1.3.5 for WordPress has arbitrary file upload via a PHP file inside a ZIP archive to wp_ajax_crellyslider_importSlider.
4327 CVE-2019-15865 352 CSRF 2019-09-03 2019-09-03
6.8
None Remote Medium Not required Partial Partial Partial
The breadcrumbs-by-menu plugin before 1.0.3 for WordPress has CSRF.
4328 CVE-2019-15858 306 Exec Code XSS 2019-09-03 2020-08-24
6.8
None Remote Medium Not required Partial Partial Partial
admin/includes/class.import.snippet.php in the "Woody ad snippets" plugin before 2.2.5 for WordPress allows unauthenticated options import, as demonstrated by storing an XSS payload for remote code execution.
4329 CVE-2019-15855 22 DoS Dir. Trav. 2020-01-17 2020-01-28
6.4
None Remote Low Not required None Partial Partial
An issue was discovered in Maarch RM before 2.5. A path traversal vulnerability allows an unauthenticated remote attacker to overwrite any files with a crafted POST request if the default installation procedure was followed. This results in a permanent Denial of Service.
4330 CVE-2019-15854 2020-01-17 2020-08-24
6.5
None Remote Low ??? Partial Partial Partial
An issue was discovered in Maarch RM before 2.5. A privilege escalation vulnerability allows an authenticated user with lowest privileges to give herself highest administration privileges via a crafted PUT request to an unauthorized resource.
4331 CVE-2019-15845 2019-11-26 2020-08-24
6.4
None Remote Low Not required Partial Partial None
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions.
4332 CVE-2019-15841 352 CSRF 2019-08-30 2019-09-03
6.8
None Remote Medium Not required Partial Partial Partial
The facebook-for-woocommerce plugin before 1.9.15 for WordPress has CSRF via ajax_woo_infobanner_post_click, ajax_woo_infobanner_post_xout, or ajax_fb_toggle_visibility.
4333 CVE-2019-15840 352 CSRF 2019-08-30 2019-09-03
6.8
None Remote Medium Not required Partial Partial Partial
The facebook-for-woocommerce plugin before 1.9.14 for WordPress has CSRF.
4334 CVE-2019-15835 352 CSRF 2019-08-30 2019-09-04
6.8
None Remote Medium Not required Partial Partial Partial
The wp-better-permalinks plugin before 3.0.5 for WordPress has CSRF.
4335 CVE-2019-15834 352 CSRF 2019-08-30 2019-09-04
6.8
None Remote Medium Not required Partial Partial Partial
The webp-converter-for-media plugin before 1.0.3 for WordPress has CSRF.
4336 CVE-2019-15832 352 CSRF 2019-08-30 2019-09-03
6.8
None Remote Medium Not required Partial Partial Partial
The visitors-traffic-real-time-statistics plugin before 1.13 for WordPress has CSRF.
4337 CVE-2019-15831 352 CSRF 2019-08-30 2019-09-03
6.8
None Remote Medium Not required Partial Partial Partial
The visitors-traffic-real-time-statistics plugin before 1.12 for WordPress has CSRF in the settings page.
4338 CVE-2019-15828 352 CSRF 2019-08-30 2019-09-05
6.8
None Remote Medium Not required Partial Partial Partial
The one-click-ssl plugin before 1.4.7 for WordPress has CSRF.
4339 CVE-2019-15813 94 Exec Code Bypass 2019-09-04 2020-10-27
6.5
None Remote Low ??? Partial Partial Partial
Multiple file upload restriction bypass vulnerabilities in Sentrifugo 3.2 could allow authenticated users to execute arbitrary code via a webshell.
4340 CVE-2019-15803 287 2019-11-14 2020-08-24
6.4
None Remote Low Not required Partial Partial None
An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Through an undocumented sequence of keypresses, undocumented functionality is triggered. A diagnostics shell is triggered via CTRL-ALT-t, which prompts for the password returned by fds_sys_passDebugPasswd_ret(). The firmware contains access control checks that determine if remote users are allowed to access this functionality. The function that performs this check (fds_sys_remoteDebugEnable_ret in libfds.so) always return TRUE with no actual checks performed. The diagnostics menu allows for reading/writing arbitrary registers and various other configuration parameters which are believed to be related to the network interface chips.
4341 CVE-2019-15781 352 CSRF 2019-08-29 2019-08-30
6.8
None Remote Medium Not required Partial Partial Partial
The facebook-by-weblizar plugin before 2.8.5 for WordPress has CSRF.
4342 CVE-2019-15779 352 2019-08-29 2019-09-03
6.8
None Remote Medium Not required Partial Partial Partial
The insta-gallery plugin before 2.4.8 for WordPress has no nonce validation for qligg_dismiss_notice or qligg_form_item_delete.
4343 CVE-2019-15770 352 2019-08-29 2019-09-04
6.8
None Remote Medium Not required Partial Partial Partial
The woo-address-book plugin before 1.6.0 for WordPress has save calls without nonce verification checks.
4344 CVE-2019-15769 352 CSRF 2019-08-29 2019-09-05
6.8
None Remote Medium Not required Partial Partial Partial
The handl-utm-grabber plugin before 2.6.5 for WordPress has CSRF via add_option and update_option.
4345 CVE-2019-15767 787 Overflow 2019-08-29 2020-08-24
6.8
None Remote Medium Not required Partial Partial Partial
In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.
4346 CVE-2019-15766 94 Exec Code 2019-10-03 2019-10-09
6.5
None Remote Low ??? Partial Partial Partial
The KSLABS KSWEB (aka ru.kslabs.ksweb) application 3.93 for Android allows authenticated remote code execution via a POST request to the AJAX handler with the configFile parameter set to the arbitrary file to be written to (and the config_text parameter set to the content of the file to be created). This can be a PHP file that is written to in the public web directory and subsequently executed. The attacker must have network connectivity to the PHP server that is running on the Android device.
4347 CVE-2019-15753 770 2019-08-28 2020-08-24
6.4
None Remote Low Not required Partial None Partial
In OpenStack os-vif 1.15.x before 1.15.2, and 1.16.0, a hard-coded MAC aging time of 0 disables MAC learning in linuxbridge, forcing obligatory Ethernet flooding of non-local destinations, which both impedes network performance and allows users to possibly view the content of packets for instances belonging to other tenants sharing the same network. Only deployments using the linuxbridge backend are affected. This occurs in PyRoute2.add() in internal/command/ip/linux/impl_pyroute2.py.
4348 CVE-2019-15747 269 2019-10-07 2019-10-09
6.5
None Remote Low ??? Partial Partial Partial
SITOS six Build v6.2.1 allows a user with the user role of Seminar Coordinator to escalate their permission to the Systemadministrator role due to insufficient checks on the server side.
4349 CVE-2019-15737 2019-09-16 2020-08-24
6.4
None Remote Low Not required Partial Partial None
An issue was discovered in GitLab Community and Enterprise Edition through 12.2.1. Certain account actions needed improved authentication and session management.
4350 CVE-2019-15715 78 Exec Code 2019-10-09 2020-09-18
6.5
None Remote Low ??? Partial Partial Partial
MantisBT before 1.3.20 and 2.22.1 allows Post Authentication Command Injection, leading to Remote Code Execution.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.