Search Results (342446 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2019-16879 1 Mysyngeryss 2 Husky Rtu 6049-e70, Husky Rtu 6049-e70 Firmware 2024-11-21 9.8 Critical
The Synergy Systems & Solutions (SSS) HUSKY RTU 6049-E70, with firmware Versions 5.0 and prior, has a Missing Authentication for Critical Function (CWE-306) vulnerability. The affected product does not require authentication for TELNET access, which may allow an attacker to change configuration or perform other malicious activities.
CVE-2019-16878 1 Portainer 1 Portainer 2024-11-21 5.4 Medium
Portainer before 1.22.1 has XSS (issue 2 of 2).
CVE-2019-16877 1 Portainer 1 Portainer 2024-11-21 8.8 High
Portainer before 1.22.1 has Incorrect Access Control (issue 4 of 4).
CVE-2019-16876 1 Portainer 1 Portainer 2024-11-21 7.5 High
Portainer before 1.22.1 allows Directory Traversal.
CVE-2019-16874 1 Portainer 1 Portainer 2024-11-21 6.5 Medium
Portainer before 1.22.1 has Incorrect Access Control (issue 2 of 4).
CVE-2019-16873 1 Portainer 1 Portainer 2024-11-21 5.4 Medium
Portainer before 1.22.1 has XSS (issue 1 of 2).
CVE-2019-16872 1 Portainer 1 Portainer 2024-11-21 9.9 Critical
Portainer before 1.22.1 has Incorrect Access Control (issue 1 of 4).
CVE-2019-16871 1 Beckhoff 1 Twincat 2024-11-21 9.8 Critical
Beckhoff Embedded Windows PLCs through 3.1.4024.0, and Beckhoff Twincat on Windows Engineering stations, allow an attacker to achieve Remote Code Execution (as SYSTEM) via the Beckhoff ADS protocol.
CVE-2019-16868 1 Emlog 1 Emlog 2024-11-21 9.8 Critical
emlog through 6.0.0beta has an arbitrary file deletion vulnerability via an admin/data.php?action=dell_all_bak request with directory traversal sequences in the bak[] parameter.
CVE-2019-16867 1 Hongcms Project 1 Hongcms 2024-11-21 6.5 Medium
HongCMS 3.0.0 allows arbitrary file deletion via a ../ in the file parameter to admin/index.php/database/ajax?action=delete, a similar issue to CVE-2018-16774. (If the attacker deletes config.php and visits install/index.php, they can reinstall the product.)
CVE-2019-16866 2 Canonical, Nlnetlabs 2 Ubuntu Linux, Unbound 2024-11-21 7.5 High
Unbound before 1.9.4 accesses uninitialized memory, which allows remote attackers to trigger a crash via a crafted NOTIFY query. The source IP address of the query must match an access-control rule.
CVE-2019-16865 3 Fedoraproject, Python, Redhat 4 Fedora, Pillow, Enterprise Linux and 1 more 2024-11-21 7.5 High
An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.
CVE-2019-16864 2 Enterprisedt, Microsoft 2 Completeftp Server, Windows 2024-11-21 8.8 High
CompleteFTPService.exe in the server in EnterpriseDT CompleteFTP before 12.1.4 allows Remote Code Execution by leveraging a Windows user account that has SSH access. The exec command is always run as SYSTEM.
CVE-2019-16863 1 St 8 St33tphf20i2c, St33tphf20i2c Firmware, St33tphf20spi and 5 more 2024-11-21 5.9 Medium
STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
CVE-2019-16862 1 Open-emr 1 Openemr 2024-11-21 6.1 Medium
Reflected XSS in interface/forms/eye_mag/view.php in OpenEMR 5.x before 5.0.2.1 allows a remote attacker to execute arbitrary code in the context of a user's session via the pid parameter.
CVE-2019-16861 2 Code42, Microsoft 2 Code42, Windows 2024-11-21 7.3 High
Code42 server through 7.0.2 for Windows has an Untrusted Search Path. In certain situations, a non-administrative attacker on the local server could create or modify a dynamic-link library (DLL). The Code42 service could then load it at runtime, and potentially execute arbitrary code at an elevated privilege on the local server.
CVE-2019-16860 2 Code42, Microsoft 2 Code42, Windows 2024-11-21 7.3 High
Code42 app through version 7.0.2 for Windows has an Untrusted Search Path. In certain situations, a non-administrative attacker on the local machine could create or modify a dynamic-link library (DLL). The Code42 service could then load it at runtime, and potentially execute arbitrary code at an elevated privilege on the local machine.
CVE-2019-16792 3 Agendaless, Debian, Oracle 3 Waitress, Debian Linux, Communications Cloud Native Core Network Function Cloud Native Environment 2024-11-21 7.1 High
Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. If two Content-Length headers are sent in a single request, Waitress would treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining. This issue is fixed in Waitress 1.4.0.
CVE-2019-16791 1 Postfix-mta-sts-resolver Project 1 Postfix-mta-sts-resolver 2024-11-21 6.9 Medium
In postfix-mta-sts-resolver before 0.5.1, All users can receive incorrect response from daemon under rare conditions, rendering downgrade of effective STS policy.
CVE-2019-16789 5 Agendaless, Debian, Fedoraproject and 2 more 6 Waitress, Debian Linux, Fedora and 3 more 2024-11-21 7.1 High
In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests containing special whitespace characters in the Transfer-Encoding header would get parsed by Waitress as being a chunked request, but a front-end server would use the Content-Length instead as the Transfer-Encoding header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. This issue is fixed in Waitress 1.4.1 through more strict HTTP field validation.