Total
8775 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2019-15859 | 1 Socomec | 2 Diris A-40, Diris A-40 Firmware | 2024-08-05 | 9.8 Critical |
Password disclosure in the web interface on socomec DIRIS A-40 devices before 48250501 allows a remote attacker to get full access to a device via the /password.jsn URI. | ||||
CVE-2019-15740 | 1 Gitlab | 1 Gitlab | 2024-08-05 | 5.3 Medium |
An issue was discovered in GitLab Community and Enterprise Edition 7.9 through 12.2.1. EXIF Geolocation data was not being removed from certain image uploads. | ||||
CVE-2019-15681 | 4 Canonical, Debian, Libvnc Project and 1 more | 15 Ubuntu Linux, Debian Linux, Libvncserver and 12 more | 2024-08-05 | 7.5 High |
LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a. | ||||
CVE-2019-15753 | 1 Openstack | 1 Os-vif | 2024-08-05 | N/A |
In OpenStack os-vif 1.15.x before 1.15.2, and 1.16.0, a hard-coded MAC aging time of 0 disables MAC learning in linuxbridge, forcing obligatory Ethernet flooding of non-local destinations, which both impedes network performance and allows users to possibly view the content of packets for instances belonging to other tenants sharing the same network. Only deployments using the linuxbridge backend are affected. This occurs in PyRoute2.add() in internal/command/ip/linux/impl_pyroute2.py. | ||||
CVE-2019-15727 | 1 Gitlab | 1 Gitlab | 2024-08-05 | 5.3 Medium |
An issue was discovered in GitLab Community and Enterprise Edition 11.2 through 12.2.1. Insufficient permission checks were being applied when displaying CI results, potentially exposing some CI metrics data to unauthorized users. | ||||
CVE-2019-15734 | 1 Gitlab | 1 Gitlab | 2024-08-05 | 4.3 Medium |
An issue was discovered in GitLab Community and Enterprise Edition 8.6 through 12.2.1. Under very specific conditions, commit titles and team member comments could become viewable to users who did not have permission to access these. | ||||
CVE-2019-15733 | 1 Gitlab | 1 Gitlab | 2024-08-05 | 4.3 Medium |
An issue was discovered in GitLab Community and Enterprise Edition 7.12 through 12.2.1. The specified default branch name could be exposed to unauthorized users. | ||||
CVE-2019-15738 | 1 Gitlab | 1 Gitlab | 2024-08-05 | 5.3 Medium |
An issue was discovered in GitLab Community and Enterprise Edition 12.0 through 12.2.1. Under certain conditions, merge request IDs were being disclosed via email. | ||||
CVE-2019-15656 | 1 Dlink | 4 Dsl-2875al, Dsl-2875al Firmware, Dsl-2877al and 1 more | 2024-08-05 | 7.5 High |
D-Link DSL-2875AL and DSL-2877AL devices through 1.00.05 are prone to information disclosure via a simple crafted request to index.asp on the web management server because of username_v and password_v variables. | ||||
CVE-2019-15580 | 1 Gitlab | 1 Gitlab | 2024-08-05 | 6.5 Medium |
An information exposure vulnerability exists in gitlab.com <v12.3.2, <v12.2.6, and <v12.1.10 when using the blocking merge request feature, it was possible for an unauthenticated user to see the head pipeline data of a public project even though pipeline visibility was restricted. | ||||
CVE-2019-15577 | 1 Gitlab | 1 Gitlab | 2024-08-05 | 4.3 Medium |
An information disclosure vulnerability exists in GitLab CE/EE <v12.3.2, <v12.2.6, and <v12.1.12 that allowed project milestones to be disclosed via groups browsing. | ||||
CVE-2019-15583 | 1 Gitlab | 1 Gitlab | 2024-08-05 | 7.5 High |
An information disclosure exists in < 12.3.2, < 12.2.6, and < 12.1.12 for GitLab Community Edition (CE) and Enterprise Edition (EE). When an issue was moved to a public project from a private one, the associated private labels and the private project namespace would be disclosed through the GitLab API. | ||||
CVE-2019-15594 | 1 Gitlab | 1 Gitlab | 2024-08-05 | 4.3 Medium |
GitLab 11.8 and later contains a security vulnerability that allows a user to obtain details of restricted pipelines via the merge request endpoint. | ||||
CVE-2019-15592 | 1 Gitlab | 1 Gitlab | 2024-08-05 | 4.3 Medium |
GitLab 12.2.2 and below contains a security vulnerability that allows a guest user in a private project to see the merge request ID associated to an issue via the activity timeline. | ||||
CVE-2019-15578 | 1 Gitlab | 1 Gitlab | 2024-08-05 | 5.3 Medium |
An information disclosure exists in < 12.3.2, < 12.2.6, and < 12.1.12 for GitLab Community Edition (CE) and Enterprise Edition (EE). The path of a private project, that used to be public, would be disclosed in the unsubscribe email link of issues and merge requests. | ||||
CVE-2019-15576 | 1 Gitlab | 1 Gitlab | 2024-08-05 | 7.5 High |
An information disclosure vulnerability exists in GitLab CE/EE <v12.3.2, <v12.2.6, and <v12.1.12 that allowed an attacker to view private system notes from a GraphQL endpoint. | ||||
CVE-2019-15579 | 1 Gitlab | 1 Gitlab | 2024-08-05 | 5.3 Medium |
An information disclosure exists in < 12.3.2, < 12.2.6, and < 12.1.12 for GitLab Community Edition (CE) and Enterprise Edition (EE) where the assignee(s) of a confidential issue in a private project would be disclosed to a guest via milestones. | ||||
CVE-2019-15162 | 2 Opengroup, Tcpdump | 2 Unix, Libpcap | 2024-08-05 | 5.3 Medium |
rpcapd/daemon.c in libpcap before 1.9.1 on non-Windows platforms provides details about why authentication failed, which might make it easier for attackers to enumerate valid usernames. | ||||
CVE-2019-15085 | 1 Prise | 1 Adas | 2024-08-05 | 7.5 High |
An issue was discovered in PRiSE adAS 1.7.0. The current database password is embedded in the change password form. | ||||
CVE-2019-15043 | 2 Grafana, Redhat | 2 Grafana, Enterprise Linux | 2024-08-05 | N/A |
In Grafana 2.x through 6.x before 6.3.4, parts of the HTTP API allow unauthenticated use. This makes it possible to run a denial of service attack against the server running Grafana. |