WAFPlanet

CVE Database - 2019

Browse known vulnerabilities with WAF coverage analysis. See which CVEs are detectable by Web Application Firewalls and their OWASP CRS rules.

6997
Matching CVEs
15562
Critical
25943
High
66770
High WAF Coverage

CVE-2019-19781

CRITICAL
9.80 CVSS 3.1

An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal.

Path Traversal
WAF: High

CVE-2014-4559

MEDIUM
6.10 CVSS 3.1

Multiple cross-site scripting (XSS) vulnerabilities in test-plugin.php in the Swipe Checkout for WP e-Commerce plugin 3.1.0 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) api_key, (2) payment_page_url, (3) merchant_id, (4) api_url, or (5) currency parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2014-4525

MEDIUM
6.10 CVSS 3.1

Cross-site scripting (XSS) vulnerability in magpie/scripts/magpie_slashbox.php in the Ebay Feeds for WordPress plugin 1.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the rss_url parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2014-4523

MEDIUM
6.10 CVSS 3.1

Cross-site scripting (XSS) vulnerability in the Easy Career Openings plugin 0.4 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-20043

MEDIUM
4.30 CVSS 3.1

In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in WordPress 3.7 to 5.3.0, authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API. For example, the contributor role does not have such rights, but this allowed them to bypass that. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

Improper Privilege Management
WAF: Low

CVE-2019-20042

MEDIUM
6.10 CVSS 3.1

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-20041

CRITICAL
9.80 CVSS 3.1

wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring.

Improper Input Validation
WAF: Medium

CVE-2019-20008

MEDIUM
5.40 CVSS 3.1

In Archery before 1.3, inserting an XSS payload into a project name (either by creating a new project or editing an existing one) will result in stored XSS on the vulnerability-scan scheduling page.

Cross-Site Scripting (XSS)
WAF: High

CVE-2013-3088

CRITICAL
9.80 CVSS 3.1

Belkin N900 router (F9K1104v1) contains an Authentication Bypass using "Javascript debugging".

Improper Authentication
WAF: Low

CVE-2013-3085

CRITICAL
9.80 CVSS 3.1

An authentication bypass exists in the web management interface in Belkin F5D8236-4 v2.

Improper Authentication
WAF: Low

CVE-2012-3462

HIGH
8.80 CVSS 3.1

A flaw was found in SSSD version 1.9.0. The SSSD's access-provider logic causes the result of the HBAC rule processing to be ignored in the event that the access-provider is also handling the setup of the user's SELinux user context.

Improper Authentication
WAF: Low

CVE-2019-19398

CRITICAL
9.80 CVSS 3.1

M5 lite 10 with versions of 8.0.0.182(C00) have an insufficient input validation vulnerability. Due to the input validation logic is incorrect, an attacker can exploit this vulnerability to modify the memory of the device by doing a series of operations. Successful exploit may lead to malicious code execution.

Improper Input Validation
WAF: Medium

CVE-2011-1474

MEDIUM
5.50 CVSS 3.1

A locally locally exploitable DOS vulnerability was found in pax-linux versions 2.6.32.33-test79.patch, 2.6.38-test3.patch, and 2.6.37.4-test14.patch. A bad bounds check in arch_get_unmapped_area_topdown triggered by programs doing an mmap after a MAP_GROWSDOWN mmap will create an infinite loop condition without releasing the VM semaphore eventually leading to a system crash.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2019-19995

HIGH
8.80 CVSS 3.1

A CSRF issue was discovered on Intelbras IWR 3000N 1.8.7 devices, leading to complete control of the router, as demonstrated by v1/system/user.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2019-16327

CRITICAL
9.80 CVSS 3.1

D-Link DIR-601 B1 2.00NA devices are vulnerable to authentication bypass. They do not check for authentication at the server side and rely on client-side validation, which is bypassable. NOTE: this is an end-of-life product.

Improper Authentication
WAF: Low

CVE-2019-16326

HIGH
8.80 CVSS 3.1

D-Link DIR-601 B1 2.00NA devices have CSRF because no anti-CSRF token is implemented. A remote attacker could exploit this in conjunction with CVE-2019-16327 to enable remote router management and device compromise. NOTE: this is an end-of-life product.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2019-16781

MEDIUM
5.40 CVSS 3.1

In WordPress before 5.3.1, authenticated users with lower privileges (like contributors) can inject JavaScript code in the block editor, which is executed within the dashboard. It can lead to an admin opening the affected post in the editor leading to XSS.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-16780

MEDIUM
5.40 CVSS 3.1

WordPress users with lower privileges (like contributors) can inject JavaScript code in the block editor using a specific payload, which is executed within the dashboard. This can lead to XSS if an admin opens the post in the editor. Execution of this attack does require an authenticated user. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release. Automatic updates are enabled by default for minor releases and we strongly recommend that you keep them enabled.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20492

MEDIUM
5.30 CVSS 3.1

An issue was discovered in GitLab Community and Enterprise Edition before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It has Incorrect Access Control (issue 2 of 6).

Incorrect Authorization
WAF: Low

CVE-2019-6035

MEDIUM
6.10 CVSS 3.1

Open redirect vulnerability in Athenz v1.8.24 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted page.

Open Redirect
WAF: Medium

CVE-2019-6033

MEDIUM
6.10 CVSS 3.1

Cross-site scripting vulnerability in a-blog cms versions prior to Ver.2.10.23 (Ver.2.10.x), Ver.2.9.26 (Ver.2.9.x), and Ver.2.8.64 (Ver.2.8.x) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-6031

MEDIUM
6.10 CVSS 3.1

Cross-site scripting vulnerability in KINZA for Windows version 5.9.2 and earlier and for Mac version 5.0.0 and earlier allows remote attackers to inject arbitrary web script or HTML via RSS reader.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-6030

HIGH
8.80 CVSS 3.1

Cross-site request forgery (CSRF) vulnerability in Custom Body Class 0.6.0 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2019-6029

MEDIUM
6.10 CVSS 3.1

Cross-site scripting vulnerability in Custom Body Class 0.6.0 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-6027

HIGH
8.80 CVSS 3.1

Cross-site request forgery (CSRF) vulnerability in WP Spell Check 7.1.9 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2019-6025

MEDIUM
6.10 CVSS 3.1

Open redirect vulnerability in Movable Type series Movable Type 7 r.4602 (7.1.3) and earlier (Movable Type 7), Movable Type 6.5.0 and 6.5.1 (Movable Type 6.5), Movable Type 6.3.9 and earlier (Movable Type 6.3.x, 6.2.x, 6.1.x, 6.0.x), Movable Type Advanced 7 r.4602 (7.1.3) and earlier (Movable Type 7), Movable Type Advanced 6.5.0 and 6.5.1 (Movable Type 6.5), Movable Type Advanced 6.3.9 and earlier (Movable Type 6.3.x, 6.2.x, 6.1.x, 6.0.x), Movable Type Premium 1.24 and earlier (Movable Type Premium), and Movable Type Premium (Advanced Edition) 1.24 and earlier (Movable Type Premium) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted URL.

Open Redirect
WAF: Medium

CVE-2019-6022

MEDIUM
6.50 CVSS 3.1

Directory traversal vulnerability in Cybozu Office 10.0.0 to 10.8.3 allows remote authenticated attackers to alter arbitrary files via the 'Customapp' function.

Path Traversal
WAF: High

CVE-2019-6021

MEDIUM
6.10 CVSS 3.1

Open redirect vulnerability in Library Information Management System LIMEDIO all versions allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted URL.

Open Redirect
WAF: Medium

CVE-2019-6020

MEDIUM
6.10 CVSS 3.1

Open redirect vulnerability in PowerCMS 5.12 and earlier (PowerCMS 5.x), 4.42 and earlier (PowerCMS 4.x), and 3.293 and earlier (PowerCMS 3.x) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted URL.

Open Redirect
WAF: Medium

CVE-2019-6018

MEDIUM
6.10 CVSS 3.1

Cross-site scripting vulnerability in NetCommons 3.2.2 and earlier (NetCommons3.x) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-6016

MEDIUM
6.10 CVSS 3.1

Cross-site scripting vulnerability in REMISE Payment Module (2.11, 2.12 and 2.13) version 3.0.12 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-6014

HIGH
8.80 CVSS 3.1

DBA-1510P firmware 1.70b009 and earlier allows an attacker to execute arbitrary OS commands via Web User Interface.

OS Command Injection
WAF: High

CVE-2019-6013

MEDIUM
6.60 CVSS 3.1

DBA-1510P firmware 1.70b009 and earlier allows authenticated attackers to execute arbitrary OS commands via Command Line Interface (CLI).

OS Command Injection
WAF: High

CVE-2019-6012

HIGH
7.20 CVSS 3.1

SQL injection vulnerability in the wpDataTables Lite Version 2.0.11 and earlier allows remote authenticated attackers to execute arbitrary SQL commands via unspecified vectors.

SQL Injection
WAF: High

CVE-2019-6011

MEDIUM
6.10 CVSS 3.1

Cross-site scripting vulnerability in wpDataTables Lite Version 2.0.11 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-19681

HIGH
8.80 CVSS 3.1

Pandora FMS 7.x suffers from remote code execution vulnerability. With an authenticated user who can modify the alert system, it is possible to define and execute commands as root/Administrator. NOTE: The product vendor states that the vulnerability as it is described is not in fact an actual vulnerability. They state that to be able to create alert commands, you need to have admin rights. They also state that the extended ACL system can disable access to specific sections of the configuration, such as defining new alert commands

Incorrect Authorization
WAF: Low

CVE-2019-19542

MEDIUM
5.40 CVSS 3.1

The ListingPro theme before v2.0.14.2 for WordPress has Persistent XSS via the Good For field on the new listing submit page.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-19541

MEDIUM
5.40 CVSS 3.1

The ListingPro theme before v2.0.14.2 for WordPress has Persistent XSS via the Best Day/Night field on the new listing submit page.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-19540

MEDIUM
6.10 CVSS 3.1

The ListingPro theme before v2.0.14.2 for WordPress has Reflected XSS via the What field on the homepage.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-19999

HIGH
7.20 CVSS 3.1

Halo before 1.2.0-beta.1 allows Server Side Template Injection (SSTI) because TemplateClassResolver.SAFER_RESOLVER is not used in the FreeMarker configuration.

Server-Side Request Forgery (SSRF)
WAF: Medium

CVE-2019-19998

HIGH
7.50 CVSS 3.1

Xiuno BBS 4.0 allows XXE via plugin/xn_wechat_public/route/token.php.

XML External Entity (XXE)
WAF: High

CVE-2019-19985

MEDIUM
5.30 CVSS 3.1

The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed unauthenticated file download with user information disclosure.

Missing Authorization
WAF: Low

CVE-2019-19984

MEDIUM
6.30 CVSS 3.1

The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed users with edit_post capabilities to manage plugin settings and email campaigns.

Incorrect Authorization
WAF: Low

CVE-2019-19982

MEDIUM
5.30 CVSS 3.1

The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed for unauthenticated option creation. In order to exploit this vulnerability, an attacker would need to send a /wp-admin/admin-post.php?es_skip=1&option_name= request.

Improper Authentication
WAF: Low

CVE-2019-19981

MEDIUM
5.40 CVSS 3.1

The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed for CSRF to be exploited on all plugin settings.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2019-19979

HIGH
8.80 CVSS 3.1

A flaw in the WordPress plugin, WP Maintenance before 5.0.6, allowed attackers to enable a vulnerable site's maintenance mode and inject malicious code affecting site visitors. There was CSRF with resultant XSS.

Cross-Site Scripting (XSS) Cross-Site Request Forgery (CSRF)
WAF: High

CVE-2018-18288

MEDIUM
6.10 CVSS 3.1

CrushFTP through 8.3.0 is vulnerable to credentials theft via URL redirection.

Open Redirect
WAF: Medium

CVE-2019-10758

CRITICAL
9.90 CVSS 3.1

mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints that uses the `toBSON` method. A misuse of the `vm` dependency to perform `exec` commands in a non-safe environment.

Code Injection
WAF: Medium

CVE-2019-19925

HIGH
7.50 CVSS 3.1

zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.

Unrestricted File Upload
WAF: Medium

CVE-2019-18249

MEDIUM
6.10 CVSS 3.1

Reliable Controls MACH-ProWebCom/Sys, all versions prior to 2.15 (Firmware versions prior to 8.26.4), may allow attacker to execute commands on behalf of the user when an authenticated user clicks on a malicious link.

Cross-Site Scripting (XSS)
WAF: High
Page 3 of 140 (6997 CVEs)