Search Results (322553 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2019-16219 2 Debian, Wordpress 2 Debian Linux, Wordpress 2024-11-21 6.1 Medium
WordPress before 5.2.3 allows XSS in shortcode previews.
CVE-2019-16218 2 Debian, Wordpress 2 Debian Linux, Wordpress 2024-11-21 6.1 Medium
WordPress before 5.2.3 allows XSS in stored comments.
CVE-2019-16217 2 Debian, Wordpress 2 Debian Linux, Wordpress 2024-11-21 6.1 Medium
WordPress before 5.2.3 allows XSS in media uploads because wp_ajax_upload_attachment is mishandled.
CVE-2019-16216 1 Zulip 1 Zulip Server 2024-11-21 5.4 Medium
Zulip server before 2.0.5 incompletely validated the MIME types of uploaded files. A user who is logged into the server could upload files of certain types to mount a stored cross-site scripting attack on other logged-in users. On a Zulip server using the default local uploads backend, the attack is only effective against browsers lacking support for Content-Security-Policy such as Internet Explorer 11. On a Zulip server using the S3 uploads backend, the attack is confined to the origin of the configured S3 uploads hostname and cannot reach the Zulip server itself.
CVE-2019-16215 1 Zulip 1 Zulip Server 2024-11-21 6.5 Medium
The Markdown parser in Zulip server before 2.0.5 used a regular expression vulnerable to exponential backtracking. A user who is logged into the server could send a crafted message causing the server to spend an effectively arbitrary amount of CPU time and stall the processing of future messages.
CVE-2019-16214 1 Libra 1 Libra Core 2024-11-21 5.7 Medium
Libra Core before 2019-09-03 has an erroneous regular expression for inline comments, which makes it easier for attackers to interfere with code auditing by using a nonstandard line-break character for a comment. For example, a Move module author can enter the // sequence (which introduces a single-line comment), followed by very brief comment text, the \r character, and code that has security-critical functionality. In many popular environments, this code is displayed on a separate line, and thus a reader may infer that the code is executed. However, the code is NOT executed, because language/compiler/ir_to_bytecode/src/parser.rs allows the comment to continue after the \r character.
CVE-2019-16213 1 Tendacn 2 Pa6, Pa6 Firmware 2024-11-21 8.8 High
Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 could allow a remote authenticated attacker to execute arbitrary commands on the system. By sending a specially crafted string, an attacker could modify the device name of an attached PLC adapter to inject and execute arbitrary commands on the system with root privileges.
CVE-2019-16212 1 Broadcom 1 Brocade Sannav 2024-11-21 8.8 High
A vulnerability in Brocade SANnav versions before v2.1.0 could allow a remote authenticated attacker to conduct an LDAP injection. The vulnerability could allow a remote attacker to bypass the authentication process.
CVE-2019-16211 1 Broadcom 1 Brocade Sannav 2024-11-21 9.8 Critical
Brocade SANnav versions before v2.1.0, contain a Plaintext Password Storage vulnerability.
CVE-2019-16210 1 Broadcom 1 Brocade Sannav 2024-11-21 5.5 Medium
Brocade SANnav versions before v2.0, logs plain text database connection password while triggering support save.
CVE-2019-16209 1 Broadcom 1 Brocade Sannav 2024-11-21 7.4 High
A vulnerability, in The ReportsTrustManager class of Brocade SANnav versions before v2.0, could allow an attacker to perform a man-in-the-middle attack against Secure Sockets Layer(SSL)connections.
CVE-2019-16208 1 Broadcom 1 Brocade Sannav 2024-11-21 7.5 High
Password-based encryption (PBE) algorithm, of Brocade SANnav versions before v2.0, has a weakness in generating cryptographic keys that may allow an attacker to decrypt passwords used with several services (Radius, TACAS, etc.).
CVE-2019-16207 1 Broadcom 1 Brocade Sannav 2024-11-21 7.8 High
Brocade SANnav versions before v2.0 use a hard-coded password, which could allow local authenticated attackers to access a back-end database and gain privileges.
CVE-2019-16206 1 Broadcom 1 Brocade Sannav 2024-11-21 5.5 Medium
The authentication mechanism, in Brocade SANnav versions before v2.0, logs plaintext account credentials at the ‘trace’ and the 'debug' logging level; which could allow a local authenticated attacker to access sensitive information.
CVE-2019-16205 1 Broadcom 1 Brocade Sannav 2024-11-21 8.8 High
A vulnerability, in Brocade SANnav versions before v2.0, could allow remote attackers to brute-force a valid session ID. The vulnerability is due to an insufficiently random session ID for several post-authentication actions in the SANnav portal.
CVE-2019-16204 1 Broadcom 1 Fabric Operating System 2024-11-21 7.5 High
Brocade Fabric OS Versions before v7.4.2f, v8.2.2a, v8.1.2j and v8.2.1d could expose external passwords, common secrets or authentication keys used between the switch and an external server.
CVE-2019-16203 1 Broadcom 1 Fabric Operating System 2024-11-21 7.5 High
Brocade Fabric OS Versions before v8.2.2a and v8.2.1d could expose the credentials of the remote ESRS server when these credentials are given as a command line option when configuring the ESRS client.
CVE-2019-16202 1 Misp 1 Misp 2024-11-21 6.5 Medium
MISP before 2.4.115 allows privilege escalation in certain situations. After updating to 2.4.115, escalation attempts are blocked by the __checkLoggedActions function with a "This could be an indication of an attempted privilege escalation on older vulnerable versions of MISP (<2.4.115)" message.
CVE-2019-16201 3 Debian, Redhat, Ruby-lang 6 Debian Linux, Enterprise Linux, Rhel E4s and 3 more 2024-11-21 7.5 High
WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 has a regular expression Denial of Service cause by looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth to the Internet or a untrusted network.
CVE-2019-16200 1 Gnu 1 Serveez 2024-11-21 7.5 High
GNU Serveez through 0.2.2 has an Information Leak. An attacker may send an HTTP POST request to the /cgi-bin/reader URI. The attacker must include a Content-length header with a large positive value that, when represented in 32 bit binary, evaluates to a negative number. The problem exists in the http_cgi_write function under http-cgi.c; however, exploitation might show svz_envblock_add in libserveez/passthrough.c as the location of the heap-based buffer over-read.