Search Results (33599 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2019-17009 3 Microsoft, Mozilla, Opensuse 5 Windows, Firefox, Firefox Esr and 2 more 2024-11-21 7.8 High
When running, the updater service wrote status and log files to an unrestricted location; potentially allowing an unprivileged process to locate and exploit a vulnerability in file handling in the updater service. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
CVE-2019-17002 1 Mozilla 1 Firefox 2024-11-21 4.3 Medium
If upgrade-insecure-requests was specified in the Content Security Policy, and a link was dragged and dropped from that page, the link was not upgraded to https. This vulnerability affects Firefox < 70.
CVE-2019-16922 1 Salesagility 1 Suitecrm 2024-11-21 5.3 Medium
SuiteCRM 7.10.x before 7.10.20 and 7.11.x before 7.11.8 allows unintended public exposure of files.
CVE-2019-16910 3 Arm, Debian, Fedoraproject 4 Mbed Crypto, Mbed Tls, Debian Linux and 1 more 2024-11-21 5.3 Medium
Arm Mbed TLS before 2.19.0 and Arm Mbed Crypto before 2.0.0, when deterministic ECDSA is enabled, use an RNG with insufficient entropy for blinding, which might allow an attacker to recover a private key via side-channel attacks if a victim signs the same message many times. (For Mbed TLS, the fix is also available in versions 2.7.12 and 2.16.3.)
CVE-2019-16900 1 Advantech 1 Webaccess\/hmi Designer 2024-11-21 7.5 High
Advantech WebAccess/HMI Designer 2.1.9.31 has a User Mode Write AV starting at MSVCR90!memcpy+0x000000000000015c.
CVE-2019-16899 1 Advantech 1 Webaccess\/hmi Designer 2024-11-21 7.5 High
In Advantech WebAccess/HMI Designer 2.1.9.31, Data from a Faulting Address controls Code Flow starting at PM_V3!CTagInfoThreadBase::GetNICInfo+0x0000000000512918.
CVE-2019-16892 3 Fedoraproject, Redhat, Rubyzip Project 4 Fedora, Cloudforms, Cloudforms Managementengine and 1 more 2024-11-21 5.5 Medium
In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption).
CVE-2019-16877 1 Portainer 1 Portainer 2024-11-21 8.8 High
Portainer before 1.22.1 has Incorrect Access Control (issue 4 of 4).
CVE-2019-16874 1 Portainer 1 Portainer 2024-11-21 6.5 Medium
Portainer before 1.22.1 has Incorrect Access Control (issue 2 of 4).
CVE-2019-16872 1 Portainer 1 Portainer 2024-11-21 9.9 Critical
Portainer before 1.22.1 has Incorrect Access Control (issue 1 of 4).
CVE-2019-16767 1 Inist 1 Ezmaster 2024-11-21 6.6 Medium
The admin sys mode is now conditional and dedicated for the special case. By default, since ezmaster@5.2.11 no instance (container) is launched with advanced capabilities (not launched as root)
CVE-2019-16766 1 Labdigital 1 Wagtail-2fa 2024-11-21 8.7 High
When using wagtail-2fa before 1.3.0, if someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS. This problem has been patched in version 1.3.0.
CVE-2019-16765 1 Microsoft 1 Codeql 2024-11-21 7.4 High
If an attacker can get a user to open a specially prepared directory tree as a workspace in Visual Studio Code with the CodeQL extension active, arbitrary code of the attacker's choosing may be executed on the user's behalf. This is fixed in version 1.0.1 of the extension. Users should upgrade to this version using Visual Studio Code Marketplace's upgrade mechanism. After upgrading, the codeQL.cli.executablePath setting can only be set in the per-user settings, and not in the per-workspace settings. More information about VS Code settings can be found here.
CVE-2019-16764 1 Powauth 1 Powassent 2024-11-21 6.5 Medium
The use of `String.to_atom/1` in PowAssent is susceptible to denial of service attacks. In `PowAssent.Phoenix.AuthorizationController` a value is fetched from the user provided params, and `String.to_atom/1` is used to convert the binary value to an atom so it can be used to fetch the provider configuration value. This is unsafe as it is user provided data, and can be used to fill up the whole atom table of ~1M which will cause the app to crash.
CVE-2019-16729 3 Canonical, Debian, Pam-python Project 3 Ubuntu Linux, Debian Linux, Pam-python 2024-11-21 7.8 High
pam-python before 1.0.7-1 has an issue in regard to the default environment variable handling of Python, which could allow for local root escalation in certain PAM setups.
CVE-2019-16722 1 Zzzcms 1 Zzzphp 2024-11-21 9.8 Critical
ZZZCMS zzzphp v1.7.2 has an insufficient protection mechanism against PHP Code Execution, because passthru bypasses an str_ireplace operation.
CVE-2019-16656 1 Joyplus Project 1 Joyplus 2024-11-21 9.8 Critical
joyplus-cms 1.6.0 allows remote attackers to execute arbitrary PHP code via /install by placing the code in the name of an object in the database.
CVE-2019-16655 1 Joyplus Project 1 Joyplus 2024-11-21 7.5 High
joyplus-cms 1.6.0 allows reinstallation if the install/ URI remains available.
CVE-2019-16653 1 Geniusbytes 1 Genius Server 2024-11-21 8.8 High
An application plugin in Genius Bytes Genius Server (Genius CDDS) 3.2.2 allows remote authenticated users to gain admin privileges.
CVE-2019-16652 1 Geniusbytes 1 Genius Server 2024-11-21 7.2 High
The BPM component in Genius Bytes Genius Server (Genius CDDS) 3.2.2 allows remote authenticated users to execute arbitrary commands.