CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  What's the CVSS score of your company?
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In February 2019

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
601 CVE-2018-20756 79 XSS 2019-02-06 2019-02-06
4.3
None Remote Medium Not required None Partial None
MODX Revolution through v2.7.0-pl allows XSS via a document resource (such as pagetitle), which is mishandled during an Update action, a Quick Edit action, or the viewing of manager logs.
602 CVE-2018-20755 79 XSS 2019-02-06 2019-02-06
4.3
None Remote Medium Not required None Partial None
MODX Revolution through v2.7.0-pl allows XSS via the User Photo field.
603 CVE-2018-20753 2019-02-05 2019-10-03
7.5
None Remote Low Not required Partial Partial Partial
Kaseya VSA RMM before R9.3 9.3.0.35, R9.4 before 9.4.0.36, and R9.5 before 9.5.0.5 allows unprivileged remote attackers to execute PowerShell payloads on all managed devices. In January 2018, attackers actively exploited this vulnerability in the wild.
604 CVE-2018-20752 1236 Exec Code 2019-02-04 2020-08-24
7.5
None Remote Low Not required Partial Partial Partial
An issue was discovered in Recon-ng before 4.9.5. Lack of validation in the modules/reporting/csv.py file allows CSV injection. More specifically, when a Twitter user possesses an Excel macro for a username, it will not be properly sanitized when exported to a CSV file. This can result in remote code execution for the attacker.
605 CVE-2018-20751 476 2019-02-04 2019-02-08
6.8
None Remote Medium Not required Partial Partial Partial
An issue was discovered in crop_page in PoDoFo 0.9.6. For a crafted PDF document, pPage->GetObject()->GetDictionary().AddKey(PdfName("MediaBox"),var) can be problematic due to the function GetObject() being called for the pPage NULL pointer object. The value of pPage at this point is 0x0, which causes a NULL pointer dereference.
606 CVE-2018-20587 2019-02-11 2019-10-03
2.1
None Local Low Not required None Partial None
Bitcoin Core 0.12.0 through 0.17.1 and Bitcoin Knots 0.12.0 through 0.17.x before 0.17.1.knots20181229 have Incorrect Access Control. Local users can exploit this to steal currency by binding the RPC IPv4 localhost port, and forwarding requests to the IPv6 localhost port.
607 CVE-2018-20253 787 Exec Code 2019-02-13 2019-10-09
6.8
None Remote Medium Not required Partial Partial Partial
In WinRAR versions prior to and including 5.60, There is an out-of-bounds write vulnerability during parsing of a crafted LHA / LZH archive formats. Successful exploitation could lead to arbitrary code execution in the context of the current user.
608 CVE-2018-20252 787 Exec Code 2019-02-05 2019-10-09
6.8
None Remote Medium Not required Partial Partial Partial
In WinRAR versions prior to and including 5.60, there is an out-of-bounds write vulnerability during parsing of crafted ACE and RAR archive formats. Successful exploitation could lead to arbitrary code execution in the context of the current user.
609 CVE-2018-20251 22 Dir. Trav. 2019-02-05 2019-10-09
4.3
None Remote Medium Not required None Partial None
In WinRAR versions prior to and including 5.61, there is path traversal vulnerability when crafting the filename field of the ACE format. The UNACE module (UNACEV2.dll) creates files and folders as written in the filename field even when WinRAR validator noticed the traversal attempt and requestd to abort the extraction process. the operation is cancelled only after the folders and files were created but prior to them being written, therefore allowing the attacker to create empty files and folders everywhere in the file system.
610 CVE-2018-20250 22 Dir. Trav. 2019-02-05 2019-10-09
6.8
None Remote Medium Not required Partial Partial Partial
In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.
611 CVE-2018-20244 79 XSS 2019-02-27 2019-04-12
3.5
None Remote Medium ??? None Partial None
In Apache Airflow before 1.10.2, a malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views.
612 CVE-2018-20242 79 XSS 2019-02-11 2019-05-19
4.3
None Remote Medium Not required None Partial None
A carefully crafted URL could trigger an XSS vulnerability on Apache JSPWiki, from versions up to 2.10.5, which could lead to session hijacking.
613 CVE-2018-20241 79 XSS 2019-02-20 2019-02-26
3.5
None Remote Medium ??? None Partial None
The Edit upload resource for a review in Atlassian Fisheye and Crucible before version 4.7.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the wbuser parameter.
614 CVE-2018-20240 79 XSS 2019-02-20 2019-02-26
3.5
None Remote Medium ??? None Partial None
The administrative linker functionality in Atlassian Fisheye and Crucible before version 4.7.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the href parameter.
615 CVE-2018-20238 384 2019-02-13 2019-02-26
5.5
None Remote Low ??? Partial Partial None
Various rest resources in Atlassian Crowd before version 3.2.7 and from version 3.3.0 before version 3.3.4 allow remote attackers to authenticate using an expired user session via an insufficient session expiration vulnerability.
616 CVE-2018-20237 200 +Info 2019-02-13 2021-12-13
4.0
None Remote Low ??? Partial None None
Atlassian Confluence Server and Data Center before version 6.13.1 allows an authenticated user to download a deleted page via the word export feature.
617 CVE-2018-20232 79 XSS 2019-02-13 2019-02-27
3.5
None Remote Medium ??? None Partial None
The labels widget gadget in Atlassian Jira before version 7.6.11 and from version 7.7.0 before version 7.13.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the rendering of retrieved content from a url location that could be manipulated by the up_projectid widget preference setting.
618 CVE-2018-20164 185 DoS 2019-02-13 2019-10-02
5.0
None Remote Low Not required None None Partial
An issue was discovered in regex.yaml (aka regexes.yaml) in UA-Parser UAP-Core before 0.6.0. A Regular Expression Denial of Service (ReDoS) issue allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to a value containing a long digit string. (The UAP-Core project contains the vulnerability, propagating to all implementations.)
619 CVE-2018-20146 2019-02-21 2019-10-03
7.2
None Local Low Not required Complete Complete Complete
An issue was discovered in Liquidware ProfileUnity before 6.8.0 with Liquidware FlexApp before 6.8.0. A local user could obtain administrator rights, as demonstrated by use of PowerShell.
620 CVE-2018-20122 78 Exec Code 2019-02-21 2020-08-24
10.0
None Remote Low Not required Complete Complete Complete
The web interface on FASTGate Fastweb devices with firmware through 0.00.47_FW_200_Askey 2017-05-17 (software through 1.0.1b) exposed a CGI binary that is vulnerable to a command injection vulnerability that can be exploited to achieve remote code execution with root privileges. No authentication is required in order to trigger the vulnerability.
621 CVE-2018-20063 434 Exec Code 2019-02-25 2019-02-27
6.5
None Remote Low ??? Partial Partial Partial
An issue was discovered in Gurock TestRail 5.6.0.3853. An "Unrestricted Upload of File" vulnerability exists in the image-upload form (available in the description editor), allowing remote authenticated users to execute arbitrary code by uploading an image file with an executable extension but a safe Content-Type value, and then accessing it via a direct request to the file in the file-upload directory (if it's accessible according to the server configuration).
622 CVE-2018-20033 119 Exec Code Overflow 2019-02-25 2021-10-20
7.5
None Remote Low Not required Partial Partial Partial
A Remote Code Execution vulnerability in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier could allow a remote attacker to corrupt the memory by allocating / deallocating memory, loading lmgrd or the vendor daemon and causing the heartbeat between lmgrd and the vendor daemon to stop. This would force the vendor daemon to shut down. No exploit of this vulnerability has been demonstrated.
623 CVE-2018-20030 400 2019-02-20 2020-06-11
7.8
None Remote Low Not required None None Complete
An error when processing the EXIF_IFD_INTEROPERABILITY and EXIF_IFD_EXIF tags within libexif version 0.6.21 can be exploited to exhaust available CPU resources.
624 CVE-2018-20026 2019-02-19 2020-08-24
5.0
None Remote Low Not required Partial None None
Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0.
625 CVE-2018-20025 330 2019-02-19 2019-04-02
5.0
None Remote Low Not required Partial None None
Use of Insufficiently Random Values exists in CODESYS V3 products versions prior V3.5.14.0.
626 CVE-2018-19645 287 Bypass 2019-02-12 2019-02-13
7.5
None Remote Low Not required Partial Partial Partial
An Authentication Bypass issue exists in Solutions Business Manager (SBM) (formerly Serena Business Manager (SBM)) versions prior to 11.5.
627 CVE-2018-19106 601 2019-02-20 2019-02-20
5.8
None Remote Medium Not required Partial Partial None
Avi Vantage before 17.2.13 uses an invalid URL encoding during a redirect operation, aka AV-33959.
628 CVE-2018-19029 476 Exec Code 2019-02-05 2019-10-09
8.3
None Remote Medium Not required Partial Partial Complete
LCDS Laquis SCADA prior to version 4.1.0.4150 allows an attacker using a specially crafted project file to supply a pointer for a controlled memory address, which may allow remote code execution, data exfiltration, or cause a system crash.
629 CVE-2018-19020 125 2019-02-12 2019-10-09
3.5
None Remote Medium ??? Partial None None
When CX-Supervisor (Versions 3.42 and prior) processes project files and tampers with the value of an offset, an attacker can force the application to read a value outside of an array.
630 CVE-2018-19018 824 Exec Code 2019-02-12 2019-10-09
6.0
None Remote Medium ??? Partial Partial Partial
An access of uninitialized pointer vulnerability in CX-Supervisor (Versions 3.42 and prior) could lead to type confusion when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
631 CVE-2018-19008 20 Exec Code 2019-02-13 2019-10-09
6.8
None Remote Medium Not required Partial Partial Partial
The TextEditor 2.0 in ABB CP400 Panel Builder versions 2.0.7.05 and earlier contain a vulnerability in the file parser of the Text Editor wherein the application doesn't properly prevent the insertion of specially crafted files which could allow arbitrary code execution.
632 CVE-2018-19004 125 2019-02-01 2019-10-09
4.3
None Remote Medium Not required Partial None None
LCDS Laquis SCADA prior to version 4.1.0.4150 allows out of bounds read when opening a specially crafted project file, which may allow data exfiltration.
633 CVE-2018-19002 94 Exec Code 2019-02-05 2019-10-09
8.3
None Remote Medium Not required Partial Partial Complete
LCDS Laquis SCADA prior to version 4.1.0.4150 allows improper control of generation of code when opening a specially crafted project file, which may allow remote code execution, data exfiltration, or cause a system crash.
634 CVE-2018-19000 287 Bypass 2019-02-05 2019-10-09
5.0
None Remote Low Not required Partial None None
LCDS Laquis SCADA prior to version 4.1.0.4150 allows an authentication bypass, which may allow an attacker access to sensitive data.
635 CVE-2018-18998 798 2019-02-05 2019-10-09
7.5
None Remote Low Not required Partial Partial Partial
LCDS Laquis SCADA prior to version 4.1.0.4150 uses hard coded credentials, which may allow an attacker unauthorized access to the system with high privileges.
636 CVE-2018-18996 862 Exec Code 2019-02-05 2019-10-09
7.5
None Remote Low Not required Partial Partial Partial
LCDS Laquis SCADA prior to version 4.1.0.4150 allows taking in user input without proper authorization or sanitation, which may allow an attacker to execute remote code on the server.
637 CVE-2018-18992 74 Exec Code 2019-02-05 2019-10-09
6.8
None Remote Medium Not required Partial Partial Partial
LCDS Laquis SCADA prior to version 4.1.0.4150 allows taking in user input without proper sanitation, which may allow an attacker to execute remote code on the server.
638 CVE-2018-18990 22 Dir. Trav. 2019-02-05 2019-10-09
5.0
None Remote Low Not required Partial None None
LCDS Laquis SCADA prior to version 4.1.0.4150 allows a user-supplied path in file operations prior to proper validation. An attacker can leverage this vulnerability to disclose sensitive information under the context of the web server process.
639 CVE-2018-18988 20 Exec Code 2019-02-01 2019-10-09
8.3
None Remote Medium Not required Partial Partial Complete
LCDS Laquis SCADA prior to version 4.1.0.4150 allows execution of script code by opening a specially crafted report format file. This may allow remote code execution, data exfiltration, or cause a system crash.
640 CVE-2018-18986 125 Exec Code 2019-02-05 2019-10-09
8.3
None Remote Medium Not required Partial Partial Complete
LCDS Laquis SCADA prior to version 4.1.0.4150 allows the opening of a specially crafted report format file that may cause an out of bounds read, which may cause a system crash, allow data exfiltration, or remote code execution.
641 CVE-2018-18692 79 XSS 2019-02-23 2019-02-25
4.3
None Remote Medium Not required None Partial None
A reflected Cross-Site scripting (XSS) vulnerability in SEMCO Semcosoft 5.3 allows remote attackers to inject arbitrary web scripts or HTML via the username parameter to the Login Form.
642 CVE-2018-18569 918 2019-02-11 2019-02-22
5.0
None Remote Low Not required Partial None None
The Dundas BI server before 5.0.1.1010 is vulnerable to a Server-Side Request Forgery attack, allowing an attacker to forge arbitrary requests (with certain restrictions) that will be executed on behalf of the attacker, via the viewUrl parameter of the "export the dashboard as an image" feature. This could be leveraged to provide a proxy to attack other servers (internal or external) or to perform network scans of external or internal networks.
643 CVE-2018-18506 2019-02-05 2020-08-24
4.3
None Remote Medium Not required None Partial None
When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. This vulnerability affects Firefox < 65.
644 CVE-2018-18505 287 2019-02-05 2019-10-03
7.5
None Remote Low Not required Partial Partial Partial
An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
645 CVE-2018-18504 125 2019-02-05 2019-02-07
7.5
None Remote Low Not required Partial Partial Partial
A crash and out-of-bounds read can occur when the buffer of a texture client is freed while it is still in use during graphic operations. This results is a potentially exploitable crash and the possibility of reading from the memory of the freed buffers. This vulnerability affects Firefox < 65.
646 CVE-2018-18503 119 Overflow 2019-02-05 2019-02-08
6.8
None Remote Medium Not required Partial Partial Partial
When JavaScript is used to create and manipulate an audio buffer, a potentially exploitable crash may occur because of a compartment mismatch in some situations. This vulnerability affects Firefox < 65.
647 CVE-2018-18502 119 Overflow Mem. Corr. 2019-02-05 2019-02-07
10.0
None Remote Low Not required Complete Complete Complete
Mozilla developers and community members reported memory safety bugs present in Firefox 64. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 65.
648 CVE-2018-18501 119 Overflow Mem. Corr. 2019-02-05 2019-04-02
7.5
None Remote Low Not required Partial Partial Partial
Mozilla developers and community members reported memory safety bugs present in Firefox 64 and Firefox ESR 60.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
649 CVE-2018-18500 416 2019-02-05 2019-04-02
7.5
None Remote Low Not required Partial Partial Partial
A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom HTML elements. This results in the stream parser object being freed while still in use, leading to a potentially exploitable crash. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
650 CVE-2018-18499 346 2019-02-28 2019-03-01
4.3
None Remote Medium Not required Partial None None
A same-origin policy violation allowing the theft of cross-origin URL entries when using a meta http-equiv="refresh" on a page to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
Total number of vulnerabilities : 839   Page : 1 2 3 4 5 6 7 8 9 10 11 12 13 (This Page)14 15 16 17
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.