Lista CVE - 2019 / Gennaio
Visualizzazione 1001 - 1100 di 1212 CVE per Gennaio 2019 (Pagina 11 di 13)
| ID CVE | Data | Titolo |
|---|---|---|
| CVE-2018-17648 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17649 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17650 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17651 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17652 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17653 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17654 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17655 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17656 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17657 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17658 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17659 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17660 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17661 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17662 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17663 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17664 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17665 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17666 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17667 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17668 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17669 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17670 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17671 | 2019-01-24 | This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17672 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17673 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17674 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17675 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17676 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17677 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17678 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17679 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17680 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17681 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17682 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17683 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17684 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17685 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17686 | 2019-01-24 | This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17687 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17688 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17689 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17690 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17691 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17692 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17693 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17694 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17695 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17696 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17697 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17698 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17699 | 2019-01-24 | This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17700 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17701 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17702 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17703 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17704 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17705 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit... |
| CVE-2018-17707 | 2019-01-24 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Epic Games Launcher versions prior to 8.2.2. User interaction is required to exploit this vulnerability in that... |
| CVE-2019-6486 | 2019-01-24 | Go before 1.10.8 and 1.11.x before 1.11.5 mishandles P-521 and P-384 elliptic curves, which allows attackers to cause a denial of service (CPU consumption) or possibly conduct ECDH private key... |
| CVE-2018-20742 | 2019-01-24 | An issue was discovered in UC Berkeley RISE Opaque before 2018-12-01. There is no boundary check on ocall_malloc. The return value could be a pointer to enclave memory. It could... |
| CVE-2019-6777 | 2019-01-24 | An issue was discovered in ZoneMinder v1.32.3. Reflected XSS exists in web/skins/classic/views/plugin.php via the zm/index.php?view=plugin pl parameter. |
| CVE-2019-1645 | 2019-01-24 | Cisco Connected Mobile Experiences Information Disclosure Vulnerability |
| CVE-2019-1646 | 2019-01-24 | Privilege Escalation Vulnerability in Cisco SD-WAN Solution |
| CVE-2019-1647 | 2019-01-24 | Cisco SD-WAN Solution Unauthorized Access Vulnerability |
| CVE-2019-1648 | 2019-01-24 | Cisco SD-WAN Solution Privilege Escalation Vulnerability |
| CVE-2019-1650 | 2019-01-24 | Cisco SD-WAN Solution Arbitrary File Overwrite Vulnerability |
| CVE-2019-1651 | 2019-01-24 | Cisco SD-WAN Solution Buffer Overflow Vulnerability |
| CVE-2019-1652 | 2019-01-24 | Cisco Small Business RV320 and RV325 Routers Command Injection Vulnerability |
| CVE-2019-1653 | 2019-01-24 | Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability |
| CVE-2019-1655 | 2019-01-24 | Cisco Webex Meetings Server Cross-Site Scripting Vulnerability |
| CVE-2019-1656 | 2019-01-24 | Cisco Enterprise NFV Infrastructure Software Linux Shell Access Vulnerability |
| CVE-2019-1657 | 2019-01-24 | Cisco AMP Threat Grid API Key Information Disclosure Vulnerability |
| CVE-2019-1658 | 2019-01-24 | Cisco Unified Intelligence Center Cross-Site Request Forgery Vulnerability |
| CVE-2019-1668 | 2019-01-24 | Cisco SocialMiner Chat Feed Cross-Site Scripting Vulnerability |
| CVE-2019-1669 | 2019-01-24 | Cisco Firepower Threat Defense Software Packet Inspection and Enforcement Bypass Vulnerability |
| CVE-2018-1959 | 2019-01-24 | IBM Security Identity Manager 7.0.1 Virtual Appliance contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components,... |
| CVE-2019-6779 | 2019-01-24 | Cscms 4.1.8 allows admin.php/links/save CSRF to add, modify, or delete friend links. |
| CVE-2019-6780 | 2019-01-24 | The Wise Chat plugin before 2.7 for WordPress mishandles external links because rendering/filters/post/WiseChatLinksPostFilter.php omits noopener and noreferrer. |
| CVE-2018-18363 | 2019-01-24 | Norton App Lock prior to 1.4.0.445 can be susceptible to a bypass exploit. In this type of circumstance, the exploit can allow the user to circumvent the app to prevent... |
| CVE-2018-5497 | 2019-01-24 | Clustered Data ONTAP versions prior to 9.1P16, 9.3P10 and 9.4P5 are susceptible to a vulnerability which discloses sensitive information to an unauthorized user. |
| CVE-2018-12237 | 2019-01-24 | The Symantec Reporter CLI 10.1 prior to 10.1.5.6 and 10.2 prior to 10.2.1.8 is susceptible to an OS command injection vulnerability. An authenticated malicious administrator with Enable mode access can... |
| CVE-2018-18981 | 2019-01-24 | In Rockwell Automation FactoryTalk Services Platform 2.90 and earlier, a remote unauthenticated attacker could send numerous crafted packets to service ports resulting in memory consumption that could lead to a... |
| CVE-2018-16098 | 2019-01-24 | In some Lenovo ThinkPads, an unquoted search path vulnerability was found in various versions of the Synaptics Pointing Device driver which could allow unauthorized code execution as a low privilege... |
| CVE-2019-6802 | 2019-01-25 | CRLF Injection in pypiserver 1.2.5 and below allows attackers to set arbitrary HTTP headers and possibly conduct XSS attacks via a %0d%0a in a URI. |
| CVE-2017-18359 | 2019-01-25 | PostGIS 2.x before 2.3.3, as used with PostgreSQL, allows remote attackers to cause a denial of service via crafted ST_AsX3D function input, as demonstrated by an abnormal server termination for... |
| CVE-2019-6803 | 2019-01-25 | typora through 0.9.9.20.3 beta has XSS, with resultant remote command execution, via the left outline bar. |
| CVE-2019-6804 | 2019-01-25 | An XSS issue was discovered on the Job Edit page in Rundeck Community Edition before 3.0.13, related to assets/javascripts/workflowStepEditorKO.js and views/execution/_wfitemEdit.gsp. |
| CVE-2019-6805 | 2019-01-25 | SQL Injection was found in S-CMS version V3.0 via the alipay/alipayapi.php O_id parameter. |
| CVE-2018-20743 | 2019-01-25 | murmur in Mumble through 1.2.19 before 2018-08-31 mishandles multiple concurrent requests that are persisted in the database, which allows remote attackers to cause a denial of service (daemon hang or... |
| CVE-2019-6956 | 2019-01-25 | An issue was discovered in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. It is a buffer over-read in ps_mix_phase in libfaad/ps_dec.c. |
| CVE-2018-16881 | 2019-01-25 | A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could send a specially crafted message to the imptcp socket, which would cause rsyslog to... |
| CVE-2019-3819 | 2019-01-25 | A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local... |
| CVE-2018-19009 | 2019-01-25 | Pilz PNOZmulti Configurator prior to version 10.9 allows an authenticated attacker with local access to the system containing the PNOZmulti Configurator software to view sensitive credential data in clear-text. This... |
| CVE-2018-19021 | 2019-01-25 | A specially crafted script could bypass the authentication of a maintenance port of Emerson DeltaV DCS Versions 11.3.1, 11.3.2, 12.3.1, 13.3.1, 14.3, R5.1, R6 and prior, which may allow an... |
| CVE-2018-19023 | 2019-01-25 | Hetronic Nova-M prior to verson r161 uses fixed codes that are reproducible by sniffing and re-transmission. This can lead to unauthorized replay of a command, spoofing of an arbitrary message,... |
| CVE-2019-6966 | 2019-01-25 | An issue was discovered in Bento4 1.5.1-628. The AP4_ElstAtom class in Core/Ap4ElstAtom.cpp has an attempted excessive memory allocation related to AP4_Array<AP4_ElstEntry>::EnsureCapacity in Core/Ap4Array.h, as demonstrated by mp42hls. |
| CVE-2019-6798 | 2019-01-26 | An issue was discovered in phpMyAdmin before 4.8.5. A vulnerability was reported where a specially crafted username can be used to trigger a SQL injection attack through the designer feature. |
| CVE-2019-6799 | 2019-01-26 | An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any... |
| CVE-2019-6976 | 2019-01-26 | libvips before 8.7.4 generates output images from uninitialized memory locations when processing corrupted input image data because iofuncs/memory.c does not zero out allocated memory. This can result in leaking raw... |