WAFPlanet

CVE Database - 2019

Browse known vulnerabilities with WAF coverage analysis. See which CVEs are detectable by Web Application Firewalls and their OWASP CRS rules.

6997
Matching CVEs
15562
Critical
25943
High
66770
High WAF Coverage

CVE-2019-20201

MEDIUM
6.50 CVSS 3.1

An issue was discovered in ezXML 0.8.3 through 0.8.6. The ezxml_parse_* functions mishandle XML entities, leading to an infinite loop in which memory allocations occur.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2015-5595

MEDIUM
6.50 CVSS 3.1

Cross-site request forgery (CSRF) vulnerability in admin.php in Zenphoto before 1.4.9 allows remote attackers to hijack the authentication of admin users for requests that may cause a denial of service (resource consumption).

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2015-5593

MEDIUM
6.10 CVSS 3.1

The sanitize_string function in Zenphoto before 1.4.9 does not properly sanitize HTML tags, which allows remote attackers to perform a cross-site scripting (XSS) attack by wrapping a payload in "<<script></script>script>payload<script></script></script>", or in an image tag, with the payload as the onerror event.

Cross-Site Scripting (XSS)
WAF: High

CVE-2015-5592

MEDIUM
6.10 CVSS 3.1

Incomplete blacklist in sanitize_string in Zenphoto before 1.4.9 allows remote attackers to conduct cross-site scripting (XSS) attacks.

Cross-Site Scripting (XSS)
WAF: High

CVE-2015-5591

HIGH
7.20 CVSS 3.1

SQL injection vulnerability in Zenphoto before 1.4.9 allow remote administrators to execute arbitrary SQL commands.

SQL Injection
WAF: High

CVE-2013-7071

MEDIUM
6.10 CVSS 3.1

Cross-site scripting (XSS) vulnerability in the handle_request function in lib/HTTPServer.pm in Monitorix before 3.4.0 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-20197

HIGH
8.80 CVSS 3.1

In Nagios XI 5.6.9, an authenticated user is able to execute arbitrary OS commands via shell metacharacters in the id parameter to schedulereport.php, in the context of the web-server user account.

OS Command Injection
WAF: High

CVE-2013-4161

HIGH
7.80 CVSS 3.1

gksu-polkit-0.0.3-6.fc18 was reported as fixing the issue in CVE-2012-5617 but the patch was improperly applied and it did not fixed the security issue.

Improper Privilege Management
WAF: Low

CVE-2019-3984

CRITICAL
9.80 CVSS 3.1

Blink XT2 Sync Module firmware prior to 2.13.11 allows remote attackers to execute arbitrary commands on the device due to improperly sanitized input when the device retrieves updates scripts from the internet.

OS Command Injection
WAF: High

CVE-2019-14466

MEDIUM
6.50 CVSS 3.1

The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unserialize is used to restore filter settings from a cookie.

Insecure Deserialization
WAF: Medium

CVE-2019-10227

MEDIUM
6.10 CVSS 3.1

openITCOCKPIT before 3.7.1 has reflected XSS in the 404-not-found component.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-9668

HIGH
7.50 CVSS 3.1

An issue was discovered in rovinbhandari FTP through 2012-03-28. receive_file in file_transfer_functions.c allows remote attackers to cause a denial of service (daemon crash) via a 0xffff datalen field value.

Improper Input Validation
WAF: Medium

CVE-2019-9556

MEDIUM
5.40 CVSS 3.1

FiberHome an5506-04-f RP2669 devices have XSS.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-9554

MEDIUM
6.10 CVSS 3.1

In the 3.1.12 Pro version of Craft CMS, XSS has been discovered in the header insertion field when adding source code at an s/admin/entries/news/new URI.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-9553

MEDIUM
6.10 CVSS 3.1

Bolt 3.6.4 has XSS via the slug, teaser, or title parameter to editcontent/pages, a related issue to CVE-2017-11128 and CVE-2018-19933.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-9207

MEDIUM
6.10 CVSS 3.1

PRTG Network Monitor v7.1.3.3378 allows XSS via the /search.htm searchtext parameter. NOTE: This product is discontinued.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-9206

MEDIUM
6.10 CVSS 3.1

PRTG Network Monitor v7.1.3.3378 allows XSS via the /public/login.htm errormsg or loginurl parameter. NOTE: This product is discontinued.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-9197

HIGH
8.80 CVSS 3.1

The com.unity3d.kharma protocol handler in Unity Editor 2018.3 allows remote attackers to execute arbitrary code.

OS Command Injection
WAF: High

CVE-2019-7751

HIGH
7.50 CVSS 3.1

A directory traversal and local file inclusion vulnerability in FPProducerInternetServer.exe in Ricoh MarcomCentral, formerly PTI Marketing, FusionPro VDP before 10.0 allows a remote attacker to list or enumerate sensitive contents of files. Furthermore, this could allow for privilege escalation by dumping the local machine's SAM and SYSTEM database files, and possibly remote code execution.

Path Traversal
WAF: High

CVE-2019-12837

MEDIUM
4.30 CVSS 3.1

The Java API in accesuniversitat.gencat.cat 1.7.5 allows remote attackers to get personal information of all registered students via several API endpoints.

Incorrect Authorization
WAF: Low

CVE-2018-19834

HIGH
7.50 CVSS 3.1

The quaker function of a smart contract implementation for BOMBBA (BOMB), an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because the function does not check the caller's identity.

Improper Authentication
WAF: Low

CVE-2018-19833

HIGH
7.50 CVSS 3.1

The owned function of a smart contract implementation for DDQ, an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because the function does not check the caller's identity.

Improper Authentication
WAF: Low

CVE-2018-19832

HIGH
7.50 CVSS 3.1

The NETM() function of a smart contract implementation for NewIntelTechMedia (NETM), an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because the function does not check the caller's identity.

Improper Authentication
WAF: Low

CVE-2018-19831

HIGH
7.50 CVSS 3.1

The ToOwner() function of a smart contract implementation for Cryptbond Network (CBN), an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because the function does not check the caller's identity.

Improper Authentication
WAF: Low

CVE-2018-19830

HIGH
7.50 CVSS 3.1

The UBSexToken() function of a smart contract implementation for Business Alliance Financial Circle (BAFC), an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because the function is public (by default) and does not check the caller's identity.

Missing Authorization
WAF: Low

CVE-2018-14476

MEDIUM
6.10 CVSS 3.1

GeniXCMS 1.1.5 has XSS via the dbuser or dbhost parameter during step 1 of installation.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-20176

HIGH
7.50 CVSS 3.1

In Pure-FTPd 1.0.49, a stack exhaustion issue was discovered in the listdir function in ls.c.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2019-12273

MEDIUM
6.50 CVSS 3.1

OutSystems Platform 10 through 11 allows ImageResourceDetail.aspx CSRF for content modifications and file uploads. NOTE: The product is self-hosted by the customer, even though it has a *.outsystemsenterprise.com domain name.) NOTE: The vendor claims that the independent researcher created the report without any type of validation and that no such vulnerability exists

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2019-12186

MEDIUM
4.80 CVSS 3.1

An issue was discovered in Sylius products. Missing input sanitization in sylius/sylius 1.0.x through 1.0.18, 1.1.x through 1.1.17, 1.2.x through 1.2.16, 1.3.x through 1.3.11, and 1.4.x through 1.4.3 and sylius/grid 1.0.x through 1.0.18, 1.1.x through 1.1.18, 1.2.x through 1.2.17, 1.3.x through 1.3.12, 1.4.x through 1.4.4, and 1.5.0 allows an attacker (an admin in the sylius/sylius case) to perform XSS by injecting malicious code into a field displayed in a grid with the "string" field type. The contents are an object, with malicious code returned by the __toString() method of that object.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-7479

HIGH
7.20 CVSS 3.1

A vulnerability in SonicOS allow authenticated read-only admin can elevate permissions to configuration mode. This vulnerability affected SonicOS Gen 5 version 5.9.1.12-4o and earlier, Gen 6 version 6.2.7.4-32n, 6.5.1.4-4n, 6.5.2.3-4n, 6.5.3.3-3n, 6.2.7.10-3n, 6.4.1.0-3n, 6.5.3.3-3n, 6.5.1.9-4n and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V).

Improper Privilege Management
WAF: Low

CVE-2019-7478

CRITICAL
9.80 CVSS 3.1

A vulnerability in GMS allow unauthenticated user to SQL injection in Webservice module. This vulnerability affected GMS versions GMS 8.4, 8.5, 8.6, 8.7, 9.0 and 9.1.

SQL Injection
WAF: High

CVE-2018-20501

MEDIUM
6.30 CVSS 3.1

An issue was discovered in GitLab Community and Enterprise Edition before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It has Incorrect Access Control.

Missing Authorization
WAF: Low

CVE-2018-20499

HIGH
7.20 CVSS 3.1

An issue was discovered in GitLab Community and Enterprise Edition before 11.x before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It allows SSRF.

Server-Side Request Forgery (SSRF)
WAF: Medium

CVE-2018-20498

MEDIUM
4.30 CVSS 3.1

An issue was discovered in GitLab Community and Enterprise Edition before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It has Incorrect Access Control.

Incorrect Authorization
WAF: Low

CVE-2018-20497

MEDIUM
5.00 CVSS 3.1

An issue was discovered in GitLab Community and Enterprise Edition before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It allows SSRF.

Server-Side Request Forgery (SSRF)
WAF: Medium

CVE-2018-20496

MEDIUM
5.40 CVSS 3.1

An issue was discovered in GitLab Community and Enterprise Edition 11.2.x through 11.4.x before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It allows XSS.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20494

HIGH
7.50 CVSS 3.1

An issue was discovered in GitLab Community and Enterprise Edition before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It has Incorrect Access Control.

Incorrect Authorization
WAF: Low

CVE-2018-20493

MEDIUM
4.30 CVSS 3.1

An issue was discovered in GitLab Community and Enterprise Edition before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It has Incorrect Access Control.

Incorrect Authorization
WAF: Low

CVE-2018-20491

MEDIUM
5.40 CVSS 3.1

An issue was discovered in GitLab Enterprise Edition 11.3.x and 11.4.x before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It allows XSS.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20490

MEDIUM
5.40 CVSS 3.1

An issue was discovered in GitLab Community and Enterprise Edition 11.2.x through 11.4.x before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It allows XSS.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20489

MEDIUM
5.30 CVSS 3.1

An issue was discovered in GitLab Community and Enterprise Edition before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It has Incorrect Access Control.

Improper Authentication
WAF: Low

CVE-2013-2016

HIGH
7.80 CVSS 3.1

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.

Improper Privilege Management
WAF: Low

CVE-2013-0196

MEDIUM
6.50 CVSS 3.1

A CSRF issue was found in OpenShift Enterprise 1.2. The web console is using 'Basic authentication' and the REST API has no CSRF attack protection mechanism. This can allow an attacker to obtain the credential and the Authorization: header when requesting the REST API via web browser.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2012-5663

HIGH
7.50 CVSS 3.1

The isearch package (textproc/isearch) before 1.47.01nb1 uses the tempnam() function to create insecure temporary files into a publicly-writable area (/tmp).

Improper Privilege Management
WAF: Low

CVE-2019-19032

HIGH
8.10 CVSS 3.1

XMLBlueprint through 16.191112 is affected by XML External Entity Injection. The impact is: Arbitrary File Read when an XML File is validated. The component is: XML Validate function. The attack vector is: Specially crafted XML payload.

XML External Entity (XXE)
WAF: High

CVE-2019-19031

HIGH
8.10 CVSS 3.1

Easy XML Editor through v1.7.8 is affected by: XML External Entity Injection. The impact is: Arbitrary File Read and DoS by consuming resources. The component is: XML Parsing. The attack vector is: Specially crafted XML payload.

XML External Entity (XXE)
WAF: High

CVE-2019-16790

HIGH
8.80 CVSS 3.1

In Tiny File Manager before 2.3.9, there is a remote code execution via Upload from URL and Edit/Rename files. Only authenticated users are impacted.

OS Command Injection Unrestricted File Upload
WAF: High

CVE-2018-7859

MEDIUM
6.10 CVSS 3.1

A security vulnerability in D-Link DGS-1510-series switches with firmware 1.20.011, 1.30.007, 1.31.B003 and older that may allow a remote attacker to inject malicious scripts in the device and execute commands via browser that is configuring the unit.

Cross-Site Scripting (XSS)
WAF: High

CVE-2012-5645

HIGH
7.50 CVSS 3.1

A denial of service flaw was found in the way the server component of Freeciv before 2.3.4 processed certain packets. A remote attacker could send a specially-crafted packet that, when processed would lead to memory exhaustion or excessive CPU consumption.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2019-20141

MEDIUM
6.10 CVSS 3.1

An XSS issue was discovered in the Laborator Neon theme 2.0 for WordPress via the data/autosuggest-remote.php q parameter.

Cross-Site Scripting (XSS)
WAF: High
Page 1 of 140 (6997 CVEs)